No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • Artificial Intelligence (AI)
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Downloads
    • Download Whitepapers & Reports
    • Download eBooks
  • Books
    • CCI Press
    • New: Bribery Beyond Borders: The Story of the Foreign Corrupt Practices Act by Severin Wirz
    • CCI Press & Compliance Bookshelf
    • The Seven Elements Book Club
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Data Privacy

EU Data Act: Time for a Reality Check

New rules could spark compliance tension: share too much personal data run afoul of GDPR, share too little and face Data Act enforcement

by Zach Judge-Raza and Jamie Elbert
March 17, 2026
in Data Privacy
internet of things and cloud devices

The EU Data Act requires connected devices and cloud services to make user-generated data accessible and transferable by design, which for many companies means the compliance work happens in the back-end architecture, not the policy document. ZwillGen attorneys Zach Judge-Raza and Jamie Elbert lay out what the act’s interoperability requirements actually demand of product teams and why the absence of centralized EU enforcement could set the table for volatility. 

The EU Data Act marks a structural shift in the EU data landscape. It aims to facilitate broader access to and sharing of data generated by connected products and related services, introducing mandatory data-sharing frameworks that intersect with the General Data Protection Regulation (GDPR). For technology companies, particularly cloud services providers and manufacturers of connected devices, compliance requires more than just the development of compliant policies, instead extending to product design, back-end architecture and operational workflow changes.

The act imposes technical design obligations on manufacturers and data holders, including cloud services and software as a service (SaaS) providers. Products and services must be designed and configured such that the data generated by their use is accessible to end users and transferable to third parties, which can include competitors. The interoperability and end-user access rights included in Articles 3 and 4 of the act create new engineering requirements that require close coordination among legal, compliance, security and product teams.

What are the operational implications of these obligations, the tension between the act and the GDPR and the resulting enforcement risks in a fragmented, multijurisdictional landscape?

Technical design obligations and interoperability requirements

The act may obligate product-level redesigns for manufacturers of Internet of Things (IoT)-connected devices and cloud services providers. Article 3(1) mandates that connected products and related services be provided in such a manner that data generated through their use is easily and securely accessible by default; free of charge; and available in a comprehensive, structured, commonly used and machine-readable format and, where technically feasible, directly accessible to the user.

For many SaaS providers and IoT manufacturers, existing data architecture is built around proprietary systems optimized for internal functionality and performance rather than interoperability or direct end-user access. Data generation, storage environments and processing logic are usually designed to support the product itself and may not be easily configurable to provide user access or enable transfer in the format and manner required by the act. As a result, compliance may require re-engineering back-end systems so that users can access and port the data they generate.

Where direct end-user data access is not technically feasible, Article 4(1) requires manufacturers and cloud services providers to make the data, including the metadata needed to interpret and use the data, readily available to the user without undue delay in the same quality as held internally and in a comprehensive, structured, commonly used and machine-readable format. Where feasible, access must be continuous and in real time. End users must also be able to request their data through simple electronic means. 

To meet these obligations, companies may need to develop new export functionality, application programming interface (API) capabilities and documentation standards, as well as internal controls to ensure accuracy, completeness and security of the data provided or transferred.

The act does not eliminate trade secret protection, but the existence of trade secrets alone does not justify refusing data access. Companies will therefore need to identify any trade secrets at issue and share data while implementing appropriate technical and contractual safeguards to preserve their secrecy. Refusal is permitted only in exceptional cases where disclosure would likely lead to serious economic harm despite such safeguards.

small child using smartphone
Data Privacy

The US Is Not Alone in Regulating Children’s Data Privacy. Here’s a Primer on the Global State of Play.

by Ceren Canal Aruoba
February 2, 2026

Emerging policies extend beyond data privacy into product governance and algorithmic accountability

Read moreDetails

Tensions and intersections between the act and GDPR

While the act facilitates the sharing and transfer of data generated by connected products and services, the GDPR restricts and regulates the processing and transfer of personal data. The two intersect but do not fully align where machine-generated data includes personal data as defined in the GDPR.

The tension arises most acutely in relation to scope and proportionality. The act requires disclosure of readily available data generated by the use of the connected product, while the GDPR limits the processing of personal data to what is necessary and proportionate for a specified purpose, subject to data minimization and purpose limitation principles.

Companies must therefore balance the risk of over- or under-disclosure. Over-disclosure of personal data in the course of complying with the act could trigger enforcement under GDPR; under-disclosure could expose companies to enforcement under the data act.

Although this tension is confined to personal data, in practice, segregating personal from nonpersonal data within telemetry, usage logs or behavioral analytics may not be straightforward. Datasets are often interwoven, and extracting nonpersonal elements may require complex filtering logic and additional engineering effort, potentially disrupting existing product infrastructure.

Compounding this complexity is the absence of a “one stop shop” mechanism under the act. Unlike GDPR, which centralizes cross-border enforcement through a lead supervisory authority, the data act leaves enforcement to national authorities in each member state. As a result, companies operating across the EU may face parallel investigations or conflicting interpretations of compliance and technical implementation requirements across jurisdictions.

Enforcement exposure, litigation risk and practical steps

As noted above, the act leaves enforcement mechanisms to the discretion of each member state. For example, Malta’s implementing legislation provides for administrative penalties of up to 5% of turnover in the preceding calendar year for significant infringements, potential liability for company administrators, a two-year limitation period for initiating proceedings and an appeals route before the Malta Digital Innovation Authority. By contrast, Germany’s draft implementing legislation sets out a tiered system of fines, including up to 5 million euros or 2% of global turnover for serious infringements, with lower thresholds and warnings for less severe cases.

In the absence of a centralized coordination mechanism, companies may face parallel investigations from multiple competent authorities. A single incident, such as delayed data transfer to a designated third party, could attract materially different consequences depending on where enforcement is initiated. For example, conduct deemed a significant infringement in Malta could be treated as mid-level in Germany, exposing a company to inconsistent outcomes or overlapping penalties as the member states may independently impose administrative fines.

Civil litigation risk adds an additional layer of exposure. End users may seek injunctive relief to compel data production or transfer under the act and may claim damages for losses arising from noncompliance. Competitors may also strategically leverage the regime by encouraging customers to exercise their access and transfer rights and positioning themselves as designated data recipients. This could allow competitors to test the robustness and timeliness of a company’s compliance infrastructure.

Takeaways for compliance professionals

Compliance with the data act will not be a one-time product change. It will require ongoing oversight, encompassing version control, product testing and documentation updates to ensure that new and existing products remain consistent with the act’s requirements.

Companies should treat readiness as an enterprise-wide initiative rather than a discrete legal or compliance issue. Practical steps include:

  • Assessing current data collection, generation, storage and usage practices to ensure that data is maintained in a way that can be easily transferred or produced. Based on this assessment, determine whether product-level or back-end changes are needed to achieve the functionality required by the data act.
  • Develop documented procedures for managing access and transfer requests, including timelines, verification steps and escalation protocols.
  • Draft and review compliance policies in coordination with technical, legal and compliance teams to ensure they accurately reflect product operations and technical constraints.
Tags: Cloud ComplianceData GovernanceGDPRInternet of Things (IoT)
Previous Post

On Venezuela Investment — Opportunity or Siren Song?

Next Post

Are Your Anonymous Reporting Channels Hiding a Bigger Problem?

Zach Judge-Raza and Jamie Elbert

Zach Judge-Raza and Jamie Elbert

Zach Judge-Raza, a London-based legal director at law firm ZwillGen, counsels clients on both domestic and cross-border matters involving privacy, data protection, and other emerging technology and data-related legal issues. An experienced litigator, he has represented clients before the Investigatory Powers Tribunal and the UK High Court.
Jamie Elbert, an attorney in ZwillGen’s Washington office, advises companies on information security, cybersecurity and privacy issues with a focus on data security incident response and regulatory compliance. She has handled breach-related inquiries from a range of state and federal regulators and supports clients with incident preparedness efforts, including drafting incident response plans and conducting tabletop exercises to test and strengthen organizational response capabilities.

Related Posts

news roundup bundled papers

Almost 40% of US Workers Have Witnessed Harassment in the Past 5 Years

by Staff and Wire Reports
February 5, 2026

Board-GC communication frequency doesn’t match organizational objectives

tiktok on phone screen

What Oracle’s TikTok Dance Can Teach Everyone About Good Data Governance

by Rita W. Garry
February 4, 2026

Many US companies still resist recognizing data governance and structured management as a value center, but the regulatory and technological...

small child using smartphone

The US Is Not Alone in Regulating Children’s Data Privacy. Here’s a Primer on the Global State of Play.

by Ceren Canal Aruoba
February 2, 2026

Emerging policies extend beyond data privacy into product governance and algorithmic accountability

federal trade commission building sign

What Recent FTC Enforcement Actions Reveal About COPPA Risks

by Stacey Brandenburg and Yiannis Vandris
February 2, 2026

Companies need to evaluate whether they have actual knowledge of users younger than 13

Next Post
anonymous faceless man

Are Your Anonymous Reporting Channels Hiding a Bigger Problem?

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2026 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • Artificial Intelligence (AI)
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Downloads
    • Download Whitepapers & Reports
    • Download eBooks
  • Books
    • CCI Press
    • New: Bribery Beyond Borders: The Story of the Foreign Corrupt Practices Act by Severin Wirz
    • CCI Press & Compliance Bookshelf
    • The Seven Elements Book Club
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2026 Corporate Compliance Insights