A formal organizational policy that governs how the company collects, processes, stores, shares, and disposes of personal data belonging to employees, candidates, customers, and other individuals, in compliance with applicable data privacy laws like GDPR, CCPA, and sector-specific regulations.
Key Takeaways
A data protection policy tells everyone in the organization how to handle personal data responsibly and legally. It's the rulebook for a world where privacy laws carry real teeth and data breaches make headlines. For HR teams, this policy is especially critical. HR departments are custodians of deeply sensitive personal data. You hold Social Security numbers, home addresses, bank account details for direct deposit, medical diagnoses from FMLA certifications, criminal history from background checks, disability information from ADA accommodation requests, and salary figures that employees consider private. A single breach of this data doesn't just violate a regulation. It breaks trust with employees in a way that's hard to repair. The policy environment has changed dramatically. GDPR raised the global bar in 2018. Sixteen US states have now passed their own privacy laws. Brazil's LGPD, India's DPDP Act, and dozens of other national laws have followed. Organizations that once could get away with a vague privacy statement on their website now need operationally specific policies with clear procedures, defined roles, and documented accountability.
These are the laws most likely to affect HR departments. Each has its own scope, requirements, and enforcement mechanisms.
| Law | Jurisdiction | Year Effective | Scope | Key HR Impact | Maximum Penalties |
|---|---|---|---|---|---|
| GDPR | EU/EEA | 2018 | Any org processing data of EU residents, regardless of location | Lawful basis for processing employee data, data subject rights, DPO requirement, breach notification | EUR 20M or 4% of global annual revenue |
| CCPA/CPRA | California, US | 2020/2023 | Businesses meeting revenue or data volume thresholds with CA residents' data | Employee data included (as of 2023 CPRA); right to know, delete, opt-out | $7,500 per intentional violation |
| LGPD | Brazil | 2020 | Any org processing data of individuals in Brazil | Employee consent or legitimate interest basis; DPO required; data subject rights | 2% of revenue in Brazil, up to BRL 50M per violation |
| DPDP Act | India | 2023 | Orgs processing personal data of individuals in India | Consent and notice requirements, data fiduciary obligations, cross-border transfer rules | Up to INR 250 crore (approx. $30M) |
| POPIA | South Africa | 2021 | Any org processing personal info of SA data subjects | Employee data processing conditions, information officer requirement | Up to ZAR 10M or imprisonment |
| State privacy laws (VA, CO, CT, etc.) | Multiple US states | 2023-2026 | Varies by state (revenue or data volume thresholds) | Employee data exemptions vary by state; some include, some exclude | Varies: $7,500-$25,000 per violation |
A data protection policy needs both legal compliance language and operational procedures that employees can actually follow. Here are the essential components.
Define whose data the policy covers (employees, candidates, contractors, dependents, former employees) and what types of data are included (identification data, financial data, health data, performance data, communication data). Specify which processing activities are covered (collection, storage, access, sharing, transfer, deletion). Make it clear that the policy applies to all formats: digital records in the HRIS, paper files in cabinets, emails, spreadsheets on individual computers, and data stored by third-party processors like payroll providers and benefits administrators.
Align the policy with the foundational principles shared across most privacy laws: lawfulness (process data only with a valid legal basis), purpose limitation (collect data only for specified, legitimate purposes), data minimization (don't collect more than you need), accuracy (keep data current and correct), storage limitation (don't keep data longer than necessary), integrity and confidentiality (protect data with appropriate security measures), and accountability (demonstrate compliance through documentation). These principles should be stated in the policy and then made operational through the specific procedures that follow.
Under GDPR and similar laws, every data processing activity needs a lawful basis. For HR data, the common bases are contractual necessity (processing needed to perform the employment contract), legal obligation (tax reporting, payroll, safety recordkeeping), legitimate interest (performance management, workforce planning, internal administration), and consent (only where freely given, which is difficult in the employer-employee power dynamic). Map each HR data processing activity to its lawful basis. Don't default to consent for employee data. Regulators view employee consent as problematic because the power imbalance means it isn't freely given.
Most privacy laws give individuals rights over their data. The policy must establish procedures for handling these requests within legal timeframes. Common rights include access (the right to know what data you hold and how it's used), rectification (the right to correct inaccurate data), deletion (the right to have data removed when it's no longer needed, subject to retention requirements), portability (the right to receive data in a machine-readable format), and objection (the right to object to processing based on legitimate interest). For HR teams, this means having a process to respond to employee data requests within the legal deadline (30 days under GDPR, 45 days under CCPA).
Before the policy can work in practice, you need to know what data you have, where it lives, and why you have it. A data mapping exercise answers these questions.
| HR Data Category | Examples | Typical Storage Location | Lawful Basis | Retention Period |
|---|---|---|---|---|
| Recruitment data | Applications, resumes, interview notes, assessments | ATS, email, shared drives | Consent (candidates), legitimate interest | 6-12 months post-decision (varies by jurisdiction) |
| Employment contract data | Offer letters, contracts, amendments, job descriptions | HRIS, personnel file | Contractual necessity | Duration of employment + retention period |
| Payroll and tax data | Salary, bank details, tax forms, deductions | Payroll system | Legal obligation, contractual necessity | 3-7 years post-separation (varies by law) |
| Benefits data | Enrollments, beneficiary info, claims history | Benefits platform, insurer systems | Contractual necessity, legal obligation | 6 years after plan termination (ERISA) |
| Health and medical data | FMLA certifications, ADA accommodations, drug tests | Separate confidential file | Legal obligation | Duration of employment + 3 years (FMLA); 30 years (OSHA exposure) |
| Performance data | Reviews, goals, PIPs, promotion records | HRIS, personnel file | Legitimate interest | Duration of employment + retention period |
| Monitoring data | Email monitoring, internet usage, GPS tracking, badge access | IT security systems | Legitimate interest (with notice) | As short as necessary; typically 30-90 days |
| Separation data | Resignation letters, termination records, exit interviews | HRIS, personnel file | Legal obligation, legitimate interest | Per retention schedule (1-7 years post-separation) |
When a breach involving employee data occurs, the clock starts immediately. Most laws impose tight notification deadlines, and delays increase both penalties and reputational damage.
A breach is any unauthorized access, disclosure, alteration, or destruction of personal data. The IT team usually detects breaches first, but HR needs to be in the response chain immediately when employee data is involved. The first step is assessing the scope: what data was compromised, how many individuals are affected, what's the likely impact, and has the breach been contained? This assessment determines notification obligations and response priorities.
GDPR requires notification to the supervisory authority within 72 hours of becoming aware of a breach that poses a risk to individuals' rights. Affected individuals must be notified without undue delay if the breach poses a high risk. All 50 US states have breach notification laws, with timelines ranging from 30 to 90 days (some states don't specify a deadline but require notification 'without unreasonable delay'). California requires notification within 72 hours for breaches involving more than 500 residents. The policy should include notification templates, contact lists for relevant authorities, and a clear escalation chain.
After containment and notification, conduct a root cause analysis. Was it a phishing attack, a system vulnerability, an insider threat, or a process failure? Update security controls to address the root cause. Review and update the data protection policy if the breach revealed gaps. Offer affected employees credit monitoring or identity protection services when sensitive financial or identity data was exposed. Document everything: the breach facts, response timeline, decisions made, and remediation steps taken. Regulators and courts evaluate the adequacy of the response, not just the fact that a breach occurred.
Transferring employee data across national borders is one of the most regulated areas of data protection law. Getting it wrong carries some of the heaviest penalties.
GDPR restricts transfers of personal data outside the EU/EEA to countries without an 'adequate' level of data protection. For transfers to the US, the EU-US Data Privacy Framework (adopted in 2023) provides a mechanism for certified companies. Other approved mechanisms include Standard Contractual Clauses (SCCs), Binding Corporate Rules (BCRs) for intra-group transfers, and derogations for specific situations (employee consent, contractual necessity). Meta's EUR 1.2 billion fine for improper US transfers shows regulators are serious about enforcement in this area.
If your company processes employee data across borders (a US-based HRIS storing data for EU employees, a global payroll provider accessing data from multiple countries), you need transfer mechanisms in place. Audit your data flows to identify all cross-border transfers. Work with legal counsel to implement the appropriate mechanism for each transfer. Update your HR vendor contracts to include required data processing agreements and transfer clauses. Don't assume that using a US-based cloud provider automatically solves the transfer issue. The provider's location, data center locations, and access patterns all matter.
Numbers that illustrate the scope of data protection regulation and the cost of non-compliance.
Implementation turns the written policy into daily practice. It requires training, technology, and ongoing monitoring.
Every HR team member handles personal data daily. Training should cover what constitutes personal data and sensitive personal data, the lawful basis for each HR processing activity, how to respond to data subject requests, what to do if they suspect a data breach, how to handle data securely (email encryption, secure file sharing, clean desk practices), and the consequences of non-compliance for both the organization and the individual. Make training specific to HR workflows, not generic IT security training. The risks HR faces (misdirected emails with salary data, unsecured paper files, sharing medical information with managers) are different from the risks IT faces.
Configure your HRIS and other HR systems with privacy by design: role-based access controls that limit data visibility by job function, encryption for data at rest and in transit, automated data retention and deletion schedules, audit logging for all access to sensitive data, and secure integrations with third-party processors (payroll, benefits, background check vendors). If your HRIS doesn't support these controls, that's a procurement conversation that needs to happen.
Data protection isn't a one-time project. Conduct annual data protection impact assessments (required under GDPR for high-risk processing). Review data mapping documentation when processes change. Audit vendor compliance with data processing agreements. Track data subject requests, response times, and outcomes. Monitor regulatory developments in every jurisdiction where you process employee data. Assign a data protection lead within HR (or coordinate with the DPO if one is required) to own this ongoing work.