Apply GDPR-compliant engineering practices across your codebase. Use this skill whenever you are designing APIs, writing data models, building authentication flows, implementing logging, handling user data, writing retention/deletion jobs, designing cloud infrastructure, or reviewing pull requests for privacy compliance. Trigger this skill for any task involving personal data, user accounts, cookies, analytics, emails, audit logs, encryption, pseudonymization, anonymization, data exports, breach response, CI/CD pipelines that process real data, or any question framed as "is this GDPR-compliant?". Inspired by CNIL developer guidance and GDPR Articles 5, 25, 32, 33, 35.
Actionable GDPR reference for engineers, architects, DevOps, and tech leads. Inspired by CNIL developer guidance and GDPR Articles 5, 25, 32, 33, 35.
Golden Rule: Collect less. Store less. Expose less. Retain less.
For deep dives, read the reference files in references/:
references/data-rights.md — user rights endpoints, DSR workflow, RoPAreferences/security.md — encryption, hashing, secrets, anonymizationreferences/operations.md — cloud, CI/CD, incident response, architecture patterns| Principle | Engineering obligation |
|---|---|
| Lawfulness, fairness, transparency | Document legal basis for every processing activity in the RoPA |
| Purpose limitation | Data collected for purpose A MUST NOT be reused for purpose B without a new legal basis |
| Data minimization | Collect only fields with a documented business need today |
| Accuracy | Provide update endpoints; propagate corrections to downstream stores |
| Storage limitation | Define TTL at schema design time — never after |
| Integrity & confidentiality | Encrypt at rest and in transit; restrict and audit access |
| Accountability | Maintain evidence of compliance; RoPA ready for DPA inspection at any time |
MUST
CreatedAt, RetentionExpiresAt to every table holding personal data at creation time.MUST NOT
MUST
****1234 for card numbers, never the full value.MUST NOT
dateOfBirth, national ID, or health data without an explicit legal basis.MUST
MUST NOT
MUST
Recommended defaults
| Data type | Max retention |
|---|---|
| Auth / audit logs | 12–24 months |
| Session / refresh tokens | 30–90 days |
| Email / notification logs | 6 months |
| Inactive user accounts | 12 months after last login → notify → delete |
| Payment records | As required by tax law (7–10 years), minimized |
| Analytics events | 13 months |
SHOULD
RetentionExpiresAt column — compute at insert time.DeletedAt) with a scheduled hard-delete after the erasure request window (30 days).MUST NOT
MUST
GET /users/{userId}if (resource.OwnerId != currentUserId) return 403.SHOULD
Referrer-Policy: no-referrer and an explicit CORS allowlist.MUST NOT
Access-Control-Allow-Origin: * on authenticated APIs.MUST
192.168.1.xxxSHOULD
"User {UserId} updated email" not "Email changed from [email protected] to [email protected]".userId as an internal identifier, not the email address.MUST
"Column 'email' violates unique constraint on table 'users'""A user with this email address already exists."MUST NOT
references/security.md for full detail)| Scope | Minimum standard |
|---|---|
| Standard personal data | AES-256 disk/volume encryption |
| Sensitive data (health, financial, biometric) | AES-256 column-level + envelope encryption via KMS |
| In transit | TLS 1.2+ (prefer 1.3); HSTS enforced |
| Keys | HSM-backed KMS; rotate DEKs annually |
MUST NOT allow TLS 1.0/1.1, null cipher suites, or hardcoded encryption keys.
MUST
MUST NOT
MUST
gitleaks, detect-secrets) to prevent secret commits..gitignore MUST include: .env, .env.*, *.pem, *.key, *.pfx, *.p12, secrets/
MUST NOT
references/security.md)MUST NOT call data "anonymized" if re-identification is possible through linkage attacks.
MUST
Bogus (.NET), Faker (JS/Python/Ruby).@example.com for all test email addresses.| Anti-pattern | Correct approach |
|---|---|
| PII in URLs | Opaque UUIDs as public identifiers |
| Logging full request bodies | Log structured event metadata only |
| "Keep forever" schema | TTL defined at design time |
| Production data in dev/test | Synthetic data + scrubbing pipeline |
| Shared credentials across teams | Individual accounts + RBAC |
| Hardcoded secrets | KMS + secret manager |
Access-Control-Allow-Origin: * on auth APIs | Explicit CORS allowlist |
| Storing consent with profile data | Dedicated consent store |
| PII in GET query params | POST body or authenticated session |
| Sequential integer IDs in public URLs | UUIDs |
| "Anonymized" data with quasi-identifiers | Apply k-anonymity, test linkage resistance |
| Mixing backup regions outside EEA | Explicit region lockdown on backup jobs |
DataClassification.Golden Rule: Collect less. Store less. Expose less. Retain less.
Every byte of personal data you do not collect is a byte you cannot lose, cannot breach, and cannot be held liable for.
Inspired by CNIL developer GDPR guidance, GDPR Articles 5, 25, 32, 33, 35, ENISA, OWASP, and NIST engineering best practices.