Back to blog

If your SaaS has a single paying customer in the EU — or even a free-tier user in Germany who signed up with their personal email — GDPR applies to you. It doesn't matter that your company is incorporated in Delaware and your servers are in Virginia. The EU's General Data Protection Regulation has extraterritorial reach, and that means US founders need to care about it.

The good news: GDPR compliance for a B2B SaaS startup is far less daunting than the consultants selling €50,000 projects make it sound. You don't need a Data Protection Officer on day one. You don't need to re-architect your entire database. You need to be systematic about a manageable set of requirements.

This is the minimal viable checklist — what you actually need, prioritized by risk.

Disclaimer: This is practical guidance, not legal advice. For your specific situation, especially if you're processing sensitive categories of data (health, financial, biometric), consult a qualified privacy lawyer. That said, everything below reflects common practice for B2B SaaS companies at the startup stage.

1. Establish a Lawful Basis for Every Type of Processing

GDPR Article 6 requires that every time you process personal data, you have a lawful basis for doing so. There are six options, but for B2B SaaS, two cover the vast majority of use cases:

Practical step: build a Record of Processing Activities (RoPA). This is a spreadsheet mapping each type of personal data you collect, what you use it for, and the lawful basis for that use. GDPR Article 30 formally requires this for companies with 250+ employees, but smaller companies who have a data breach and can't produce one will face regulatory scrutiny. It takes a day to build and protects you significantly.

2. Rewrite Your Privacy Policy

Most US startup privacy policies fail GDPR requirements. A GDPR-compliant privacy policy must include, in plain language:

A Termly or Iubenda-generated policy can cover most of these if configured correctly. For a company processing any significant volume of EU data, a lawyer-reviewed custom policy is worth the $500–$1,500 investment.

3. Sign Data Processing Agreements (DPAs) with Every Vendor

If you share personal data with any third-party vendor — even just passing an email address to an email marketing platform — you are legally required to have a Data Processing Agreement in place. This is GDPR Article 28.

A DPA specifies what the processor can do with the data, security measures they must implement, how they handle breaches, and how data is deleted when the relationship ends.

The practical steps:

Maintain a vendor register documenting which processors you use, what data they access, where they store it, and the DPA status. This is the document DPA regulators ask for first in an investigation.

4. Build a Process for Data Subject Access Requests (DSARs)

Under GDPR, any EU individual can request to know what data you hold about them (access request), ask you to delete it (right to erasure), ask you to correct inaccurate data, or request a portable copy. You have 30 days to respond from the date of a valid request.

For a startup, "process" doesn't mean enterprise software. It means:

Most B2B SaaS companies in the startup phase receive zero to a handful of DSARs per year. The risk isn't volume — it's being caught with no process at all when a regulator asks how you handle them.

5. Cookie Consent (and Why It's More Annoying Than Risky)

Cookie banners are required if you use cookies for non-essential purposes (analytics, advertising, tracking) on pages accessible to EU users. The rules come from the ePrivacy Directive, which predates GDPR, but are enforced alongside it.

The minimal viable implementation for B2B SaaS:

If your product is B2B SaaS and the cookies in question are only firing for logged-in users who are employees of your B2B customers, the regulatory risk is lower. The high-risk scenario is a public marketing site with aggressive tracking before any consent is obtained.

6. The 72-Hour Breach Notification Rule

GDPR Article 33 requires you to notify your lead supervisory authority within 72 hours of becoming aware of a personal data breach. "Breach" includes unauthorized access, accidental deletion, ransomware, and even sending an email containing personal data to the wrong recipient.

The 72-hour clock starts when you "become aware" — which regulators interpret as when anyone in your organization knew, not just when leadership was formally informed.

Practical implication: Your incident response runbook needs a GDPR escalation path. As soon as anyone on your team suspects a breach involving EU personal data, the clock starts. The first 4 hours should be: confirm the breach, assess scope, notify your DPO or privacy lead, begin the notification assessment. You don't have to have all the answers within 72 hours — but you do have to notify the supervisory authority with the information you have.

If the breach is likely to result in high risk to individuals, you must also notify the affected individuals directly — and there's no fixed timeline for that, but "without undue delay" means as fast as reasonably possible.

7. Standard Contractual Clauses (SCCs) for Data Transfers

If you transfer personal data from the EU to the US — which you do if EU users' data hits US servers — you need a legal transfer mechanism. Since the invalidation of Privacy Shield in 2020, the primary mechanism for US companies is Standard Contractual Clauses (SCCs), updated in 2021 by the European Commission.

The updated 2021 SCCs must be incorporated into your DPAs with EU customers and your agreements with subprocessors. AWS, Google Cloud, and Azure all offer EU SCCs as part of their data processing agreements. For your own customer contracts, you need either to include the SCCs directly or reference them in your DPA.

The EU-US Data Privacy Framework (DPF) reinstated in 2023 provides an alternative certification pathway for US companies that prefer not to use SCCs. Certification costs around $1,500 per year and requires you to comply with DPF principles. For startups, SCCs are typically simpler.

The Minimal Viable GDPR Checklist