Data Processing complete

Control over how data is processed, transformed, and accessed by compute workloads

L0 Unaware

No awareness of where or how data is processed; the provider operates without restrictions on processing location, method, or access

Criteria

  • PROC-L0-C1 The organisation has no documented understanding of where its data is processed - neither geographic location nor infrastructure type (shared, dedicated, on-premises) is known
    Evidence guidance

    Request processing location documentation from the provider; review service agreements for any mention of data processing locations or infrastructure details

  • PROC-L0-C2 No purpose limitation exists for data processing - the provider may use customer data for analytics, model training, product improvement, or other secondary purposes without explicit consent
    Evidence guidance

    Review the provider's terms of service and privacy policy for clauses granting broad processing rights; check for opt-out mechanisms

  • PROC-L0-C3 The organisation cannot identify which sub-processors or third parties have access to data during processing
    Evidence guidance

    Ask the provider for a sub-processor list; review data flow diagrams if available; check whether sub-processor notifications are part of the contract

Indicators

  • Staff cannot name the cloud region or data centre where production workloads run
  • No data processing agreement (DPA) exists with any service provider
  • Provider terms include broad rights to use customer data for unspecified purposes
  • No inventory of sub-processors or third-party data access exists

Regulatory mappings

RegulationArticlesRiskNote
GDPRart-5, art-6criticalProcessing without documented purpose limitation violates the purpose limitation (Art 5(1)(b)) and lawfulness (Art 6) principles
NDSGart-9highCross-border data processing without awareness may violate Art 9 nDSG disclosure requirements for transfers abroad
NIS2art-21highAbsence of processing controls undermines the risk management measures required by Art 21

Upgrade path

Catalogue all services that process organisational data and request processing location details from each provider. Review provider terms of service for purpose limitation clauses. Begin drafting a sub-processor inventory.

Risk if stagnant

Without visibility into processing activities, the organisation cannot assess regulatory compliance, detect unauthorised data use, or respond to data subject requests. A provider could relocate processing to a jurisdiction with incompatible data protection standards without the organisation's knowledge.

Typical characteristics
  • No processing inventory. The organisation uses cloud services, SaaS platforms, and third-party tools without knowing which data centres or regions handle its workloads. Infrastructure could span multiple jurisdictions without anyone being aware.
  • Unrestricted provider access. The provider's operations, support, and engineering teams can access customer data without restriction. No technical barriers (encryption, access controls) limit what provider personnel can see or do.
  • No purpose limitation. Terms of service may grant the provider rights to use customer data for analytics, advertising, machine learning training, or product improvement - and the organisation has not reviewed or negotiated these terms.
  • Unknown sub-processors. Data may flow through multiple third parties during processing - CDNs, analytics platforms, logging services - without the organisation's knowledge or consent.
Why this is dangerous

When an organisation does not understand its processing landscape, it cannot satisfy even the most fundamental regulatory obligations. GDPR Art 5(1)(b) requires that data be collected for specified, explicit, and legitimate purposes. If the organisation cannot articulate what processing occurs, it cannot demonstrate lawful purpose.

Beyond compliance, the absence of processing awareness creates operational blind spots. Performance issues, data leaks, or service outages in unknown sub-processors can cascade without any ability to diagnose or respond.

Sovereignty implications

Sovereignty over data processing is non-existent at this level. The organisation has outsourced not just the processing itself but all decisions about how processing is conducted. This represents complete dependency - the provider could change processing locations, introduce new sub-processors, or alter processing methods without the organisation having any mechanism to detect or prevent it.