GDPR Compliance in Digital Stress Research
Abstract
The General Data Protection Regulation (GDPR) presents both challenges and opportunities for digital health research. This article examines GDPR compliance considerations in the context of web-based cognitive stress testing synchronized with wearable device data. We present a privacy-first architecture that satisfies GDPR requirements while enabling robust scientific investigation. Key features include local-first data storage, explicit informed consent, comprehensive privacy controls, and participant-controlled data export. Our implementation demonstrates that GDPR compliance need not compromise research quality—rather, it can enhance participant trust, data quality, and ethical research practices.
1. Introduction: GDPR in Research Context
The EU General Data Protection Regulation (GDPR), effective since May 25, 2018, fundamentally changed how personal data must be handled across all sectors, including scientific research. While research enjoys certain exemptions under Article 89, these come with heightened responsibility: researchers must implement “appropriate safeguards” for data subjects’ rights and freedoms.
For digital health research combining behavioral data (cognitive test performance) with physiological data (wearable sensors), GDPR compliance is particularly critical. This data is often special category data under Article 9, concerning health, and thus subject to stricter protection requirements.
1.1 Why GDPR Compliance Matters for Research
Legal obligation: Non-compliance can result in fines up to €20 million or 4% of global annual revenue, whichever is higher. For institutions, reputational damage can be equally severe.
Ethical imperative: GDPR principles align with research ethics—respect for autonomy, beneficence, and justice. Compliance demonstrates respect for participants.
Data quality: Transparent data practices build trust, improving recruitment and reducing dropout rates. Participants who understand and trust data handling provide more complete, accurate data.
International collaboration: GDPR compliance facilitates data sharing with European partners and satisfies increasingly stringent international data protection standards.
2. GDPR Principles Applied to Stress Research
2.1 Lawfulness, Fairness, and Transparency (Article 5.1.a)
GDPR Requirement: Data processing must have a legal basis, treat participants fairly, and operate transparently.
Our Implementation:
Legal Basis: We rely on explicit consent (Article 6.1.a) as the primary legal basis, supplemented by legitimate interest (Article 6.1.f) for research purposes. Consent is:
- Freely given: Participation is voluntary with no consequences for refusal
- Specific: Separate consent for each processing purpose
- Informed: Comprehensive privacy policy in clear language
- Unambiguous: Active opt-in via checkbox, no pre-ticked boxes
Transparency: Complete privacy policy available before any data collection, explaining:
- What data is collected (identity, contact, performance, physiological)
- Why it’s collected (stress research, smartwatch correlation)
- How it’s stored (local browser storage, participant exports)
- Who has access (only participant initially, then researchers upon explicit data sharing)
- How long it’s retained (participant-controlled deletion)
<!-- Example: Explicit, granular consent -->
<div class="checkbox-item">
<input type="checkbox" id="consent-privacy" required>
<label for="consent-privacy">
I have read and understood the Privacy Policy and agree to
the collection and processing of my personal data.
</label>
</div>
<div class="checkbox-item">
<input type="checkbox" id="consent-storage" required>
<label for="consent-storage">
I consent to the use of browser storage to store my test
data and preferences on my device.
</label>
</div>
2.2 Purpose Limitation (Article 5.1.b)
GDPR Requirement: Data collected for specified, explicit, legitimate purposes and not processed in ways incompatible with those purposes.
Our Implementation:
Specified purposes:
- Conduct cognitive stress research
- Correlate test performance with smartwatch biometric measurements
- Identify performance patterns and stress responses
- Generate anonymized statistical reports
- Improve testing methodology
Not used for:
- Marketing or commercial purposes
- Sharing with third parties without consent
- Automated decision-making affecting participants
- Any purpose not explicitly disclosed
Purpose tracking in logs:
logEvent(EventTypes.SESSION_START, 1, {
session_id: Date.now(),
purpose: 'stress_research',
study_id: 'STRESS_WATCH_2025'
});
2.3 Data Minimisation (Article 5.1.c)
GDPR Requirement: Only collect data adequate, relevant, and limited to what is necessary.
Our Implementation:
Essential identifiers only:
- Name: Required for linking multiple sessions, addressing participant
- Email: Required for exercising GDPR rights (access, erasure requests)
No collection of:
- Physical address
- Phone number
- Government ID numbers
- Demographic data beyond what’s necessary for analysis
- IP addresses (no server-side logging)
- Device fingerprinting data
Rationale for each field:
| Data Field | Why Collected | GDPR Justification |
|---|---|---|
| Name | Participant identification across sessions | Necessary for research integrity |
| Contact for data requests, consent withdrawal | Required for GDPR rights exercise | |
| Performance data | Core research variable | Direct research purpose |
| Timestamps | Synchronization with wearable data | Essential for methodology |
2.4 Accuracy (Article 5.1.d)
GDPR Requirement: Data must be accurate and kept up to date.
Our Implementation:
Validation mechanisms:
- Email format validation before submission
- Confirmation prompts before data export
- Session metadata includes collection timestamp and device info for context
Right to rectification: Participants can:
- Update their information before each new session
- Request correction of stored data via contact email
- Export, edit, and re-import corrected data
Data quality controls:
function validateUserInfo() {
const name = userNameInput.value.trim();
const email = userEmailInput.value.trim();
const emailRegex = /^[^\s@]+@[^\s@]+\.[^\s@]+$/;
const isValid = name.length > 0 && emailRegex.test(email);
return isValid;
}
2.5 Storage Limitation (Article 5.1.e)
GDPR Requirement: Data kept only as long as necessary for the purposes.
Our Implementation:
Local storage model: Data stored in participant’s browser (localStorage), not on servers. Retention is participant-controlled:
Retention periods:
- Session data: Retained until browser storage cleared by participant
- Consent records: Retained in localStorage to prevent repeated consent requests
- Exported data: Participant-controlled (downloaded files under their management)
Automatic cleanup:
- sessionStorage automatically clears when browser closes (used for temporary data like current user info)
- No server-side retention policies needed (no server storage)
Deletion procedures:
- Individual test deletion: Clear browser storage for specific test
- Complete deletion: “Clear All Data” button removes all tests, consent, logs
- Browser-level deletion: Standard browser “Clear browsing data” function
- Right to erasure: Contact researchers to delete any exported/shared data
// Example: Clear all data implementation
document.getElementById('clear-all-data').addEventListener('click', () => {
if (confirm('Are you sure you want to clear all stored data?')) {
localStorage.removeItem('mental_arithmetic_gdpr_consent');
localStorage.removeItem('mental_arithmetic_logs');
// ... clear all test data
sessionStorage.clear();
alert('All data has been cleared.');
}
});
2.6 Integrity and Confidentiality (Article 5.1.f)
GDPR Requirement: Appropriate security for personal data protection.
Our Implementation:
Technical measures:
- Local-first storage: Data never transmitted to servers automatically
- Client-side processing: All computations in participant’s browser
- No cookies: No tracking or third-party cookies
- HTTPS enforcement: Secure connection for web application delivery
- Export encryption option: Ability to encrypt exported files before sharing
Organizational measures:
- Access control: Only participant has access until explicit data sharing
- Data handling protocols: Documented procedures for researchers receiving shared data
- Training: Researchers trained on GDPR requirements and secure data handling
- Data Processing Agreements: Required for any third-party analysis services
Security for exported data:
// Participants export data only when ready
document.getElementById('download-json').addEventListener('click', () => {
// Data export is explicit participant action
const logs = getAllLogs();
const dataStr = JSON.stringify(logs, null, 2);
downloadFile(dataStr, `stress_test_${Date.now()}.json`, 'application/json');
});
2.7 Accountability (Article 5.2)
GDPR Requirement: Controller must demonstrate compliance with GDPR principles.
Our Implementation:
Documentation:
- Comprehensive privacy policy (Appendix C)
- Data Protection Impact Assessment (DPIA) for high-risk processing
- Consent records with timestamps
- Technical documentation of security measures
- Audit logs of data access (for shared data)
Demonstrable compliance:
// Consent tracking
const consentData = {
timestamp: Date.now(),
date: new Date().toISOString(),
consents: {
privacy_policy: true,
browser_storage: true,
age_verification: true,
voluntary_participation: true
},
policy_version: '2025-01-14',
ip_address: null // Deliberately not collected
};
localStorage.setItem('gdpr_consent', JSON.stringify(consentData));
3. GDPR Rights: Implementation Strategies
3.1 Right of Access (Article 15)
Participant request: “Provide me all personal data you hold about me.”
Implementation:
- Immediate access: Export buttons provide instant JSON/CSV downloads
- Comprehensive access: All logs, consent records, and metadata included
- Structured format: Machine-readable JSON and human-readable CSV
- No fee: Free export, no restrictions on frequency
Response time: Immediate (self-service) or within 30 days (for data shared with researchers)
3.2 Right to Rectification (Article 16)
Participant request: “My email address is incorrect in the data.”
Implementation:
- Pre-export correction: Participants can update info before each session
- Post-export: Contact researchers to correct shared data
- Researcher obligations: Update all copies within 30 days, notify co-researchers if data was shared
3.3 Right to Erasure / “Right to be Forgotten” (Article 17)
Participant request: “Delete all my data.”
Implementation:
- Local data: “Clear All Data” button provides immediate deletion
- Shared data: Email researchers to request deletion from research databases
- Limitations: May retain anonymized aggregate statistics (GDPR-compliant)
- Confirmation: Provide deletion confirmation within 30 days
Deletion procedure:
function deleteAllParticipantData(participantEmail) {
// 1. Clear local browser storage
localStorage.clear();
sessionStorage.clear();
// 2. Generate deletion confirmation
const confirmation = {
participant: participantEmail,
deletion_date: new Date().toISOString(),
deleted_items: [
'All session logs',
'Consent records',
'User preferences',
'Cached data'
]
};
// 3. Email confirmation to participant
// 4. Log deletion in compliance records (without personal data)
}
3.4 Right to Restriction of Processing (Article 18)
Participant request: “Stop processing my data while we resolve an accuracy dispute.”
Implementation:
- Flag mechanism: Mark participant data as “restricted” in research database
- Limited processing: Only storage allowed, no analysis or sharing
- Notification: Inform participant before lifting restriction
3.5 Right to Data Portability (Article 20)
Participant request: “Give me my data in a format I can transfer to another service.”
Implementation:
- Structured formats: JSON (machine-readable), CSV (spreadsheet-compatible)
- Complete data: All logs with metadata and timestamps
- Standardized schema: Documented data structure for interoperability
Export example:
{
"export_metadata": {
"export_date": "2025-01-28T10:30:00Z",
"participant_email": "[email protected]",
"data_format_version": "1.0",
"tests_included": ["mental_arithmetic", "tetris", "memory"]
},
"consent_records": [ /* ... */ ],
"session_logs": [ /* ... */ ],
"performance_summary": { /* ... */ }
}
3.6 Right to Object (Article 21)
Participant request: “I object to processing based on legitimate interests.”
Implementation:
- Consent-based: Primary legal basis is consent, so objection = withdrawal of consent
- Effect: Stop all processing, offer deletion of existing data
- No penalty: No negative consequences for objection
3.7 Automated Decision-Making and Profiling (Article 22)
GDPR requirement: Right not to be subject to solely automated decisions with legal/significant effects.
Our position:
- No automated decisions: Research data used only for aggregate analysis, not individual decisions
- No profiling: No automated personality assessments or predictions affecting participants
- Human oversight: All research conclusions reviewed by qualified researchers
4. Special Category Data Considerations (Article 9)
4.1 Health Data Classification
Physiological data from wearables (heart rate, HRV, stress scores) constitutes health data under GDPR Article 4(15), classified as special category data under Article 9.
Implications:
- Higher protection standards required
- Explicit consent must specifically address health data
- Extra security measures justified
- Data Protection Impact Assessment (DPIA) recommended
4.2 Explicit Consent for Health Data
Implementation:
<div class="checkbox-item">
<input type="checkbox" id="consent-health-data" required>
<label for="consent-health-data">
I consent to the processing of my health data (heart rate,
heart rate variability, stress metrics) collected from my
wearable device for the purpose of stress research.
</label>
</div>
Consent must be:
- Separate from general consent
- Specific about health data types
- Clear about research purposes
- Revocable at any time
4.3 Conditions for Processing (Article 9.2)
Applicable conditions:
- (a) Explicit consent: Primary basis for health data processing
- (j) Scientific research: Secondary basis under Article 89, with appropriate safeguards
Safeguards implemented:
- Pseudonymization: Participant identifiers separated from physiological data in analysis
- Access controls: Restricted access to identified health data
- Aggregation: Individual-level health data aggregated for reporting
- Secure storage: Encrypted storage for exported health data files
5. Data Protection Impact Assessment (DPIA)
5.1 When DPIA is Required
Article 35 requires DPIA when processing is “likely to result in high risk” to data subjects. Our research triggers DPIA because it involves:
- ✓ Systematic monitoring (continuous cognitive and physiological tracking)
- ✓ Special category data (health information from wearables)
- ✓ Large-scale processing (potentially hundreds of participants)
5.2 DPIA Components
1. Systematic description of processing:
- Collect name, email, cognitive performance, wearable physiological data
- Process locally in browser, export on participant command
- Analyze correlations between cognitive stress and physiological responses
- Publish aggregate findings in scientific literature
2. Necessity and proportionality assessment:
- Necessary: Synchronization requires precise timestamps and participant identifiers
- Proportionate: Minimal identifiers (name, email), no excessive personal data
- Alternative considered: Anonymous participation rejected due to inability to link sessions
3. Risk assessment:
| Risk | Likelihood | Severity | Mitigation |
|---|---|---|---|
| Unauthorized access to health data | Low | High | Local storage only, participant-controlled export |
| Data breach of exported files | Medium | High | Encryption recommended, secure transfer protocols |
| Re-identification of anonymized data | Low | Medium | Statistical disclosure control, k-anonymity |
| Psychological distress from tests | Medium | Low | Stress tests time-limited, stop-anytime option |
| Coercion to participate | Low | Medium | Explicit voluntary participation statement |
4. Mitigation measures:
- Local-first architecture prevents server breaches
- Explicit consent process ensures informed participation
- Right to erasure allows harm mitigation
- Psychological safeguards (time limits, voluntary participation)
- Researcher training on GDPR and ethical data handling
5. Consultation:
- Data Protection Officer (DPO) consulted
- Institutional Review Board (IRB) approval obtained
- Participant representatives involved in design
6. International Data Transfers
6.1 No Automatic Transfers
Architecture: Local browser storage means data physically remains in participant’s jurisdiction until they export and share it.
Advantages:
- No cross-border transfer issues during data collection
- Participant controls if/when data crosses borders
- Simplified compliance (no SCCs or BCRs needed initially)
6.2 When Transfers Occur
Scenario: Participant in EU exports data and emails to researcher in USA.
GDPR compliance:
- Chapter V requirements apply (Articles 44-50)
- Consent-based transfer: Participant explicitly agrees to transfer (Article 49.1.a)
- Standard Contractual Clauses (SCCs): Use for institutional collaborations
- Transfer Impact Assessment: Document safeguards for third countries
Best practice: Include transfer information in consent:
<div class="checkbox-item">
<input type="checkbox" id="consent-international-transfer">
<label for="consent-international-transfer">
I understand my data may be transferred internationally if I
choose to share it with researchers outside the EU, and I
consent to such transfers for research purposes.
</label>
</div>
7. Children and Age Verification
7.1 Age of Consent for Data Processing
GDPR Article 8: Age of digital consent varies by member state (13-16 years).
Our approach: Set minimum age at 16 years (highest EU threshold) to ensure compliance across all member states.
Implementation:
<div class="checkbox-item">
<input type="checkbox" id="consent-age" required>
<label for="consent-age">
I confirm that I am at least 16 years of age or have
parental/guardian consent to participate.
</label>
</div>
7.2 Parental Consent
For participants under 16:
- Require verifiable parental consent
- Provide separate privacy notice for parents
- Additional safeguards: shorter session times, simplified stress tests
Verification methods:
- Email confirmation to parent email address
- Signed consent form (digital signature)
- Video call verification for remote studies
8. Researcher Responsibilities
8.1 Data Controller vs. Processor
Participant: Data controller (owns and controls their local data)
Researcher: Initially data processor (if participant shares data), becomes joint controller for research purposes
Data Processing Agreement (DPA): When participant shares data with researcher institution:
This agreement defines:
- Purpose: Stress research analyzing cognitive-physiological correlations
- Duration: Until research completion + statutory retention period
- Security: Encrypted storage, access controls, audit logging
- Sub-processing: Third-party analysis tools require prior approval
- Data subject rights: Researcher assists with access, erasure requests
- Breach notification: Within 72 hours to participant
8.2 Researcher Training Requirements
Mandatory training:
- GDPR fundamentals and research exemptions
- Secure data handling procedures
- Recognizing and responding to data subject requests
- Breach identification and reporting
- Ethical implications of health data research
8.3 Data Retention and Destruction
Research data retention:
- Active research: Duration of study + analysis
- Publication: Minimum 5 years post-publication (journal requirements)
- Long-term: Archival for replication, with re-consent or anonymization
- Destruction: Secure deletion meeting data protection standards
Destruction methods:
- Digital: Multi-pass overwrite or cryptographic erasure
- Physical: Shredding, degaussing for backup media
- Documentation: Certificate of destruction for compliance records
9. Breach Notification Procedures
9.1 What Constitutes a Breach
Personal data breach (Article 4.12): Breach of security leading to accidental or unlawful destruction, loss, alteration, unauthorized disclosure, or access.
Examples in our context:
- Participant accidentally shares unencrypted data file publicly
- Researcher laptop stolen containing participant data
- Malware infects researcher computer with access to data
- Unauthorized person accesses research database
9.2 Breach Response Timeline
Within 72 hours (Article 33):
- Assess breach severity and scope
- Notify supervisory authority (if high risk)
- Document breach in compliance log
Without undue delay (Article 34):
- Notify affected participants (if high risk to rights/freedoms)
- Provide clear explanation, consequences, and mitigation measures
- Offer support (e.g., identity protection services if applicable)
9.3 Breach Prevention
Technical measures:
- Encryption of exported data files (recommended to participants)
- Access controls on research databases
- Regular security audits and penetration testing
- Incident response plan and regular drills
Organizational measures:
- Clear data handling policies
- Mandatory security training
- Background checks for researchers with data access
- Regular compliance reviews
10. Practical Compliance Checklist
10.1 Pre-Study Checklist
- Privacy policy drafted and reviewed by legal counsel
- Consent forms include all required elements
- DPIA completed and approved
- DPO consulted (if required for institution)
- IRB/Ethics committee approval obtained
- Researcher training completed
- Data handling procedures documented
- Technical safeguards tested
- Breach response plan established
- Participant information materials prepared
10.2 During-Study Checklist
- Consent obtained before any data collection
- Participants informed of their rights
- Data minimization principles followed
- Security measures active and monitored
- Data subject requests handled within 30 days
- Any changes to processing notified to participants
- Compliance log maintained
- Regular audits conducted
10.3 Post-Study Checklist
- Data retention periods adhered to
- Anonymization applied where appropriate
- Published research doesn’t enable re-identification
- Shared data protected by agreements
- Destruction procedures followed at end of retention
- Final compliance report generated
- Lessons learned documented for future studies
11. Case Study: Handling a Data Subject Request
Scenario
Participant Maria sends email: “I want to withdraw from the study and have all my data deleted. Also, I need a copy of everything you have about me.”
GDPR-Compliant Response
Step 1: Acknowledge (within 1-2 business days)
Dear Maria,
Thank you for contacting us. We have received your request to:
1. Withdraw from the study
2. Receive a copy of your personal data (Right of Access)
3. Have your data deleted (Right to Erasure)
We will process your request within 30 days as required by GDPR.
However, we aim to complete this within 7 days.
Your reference number: DSR-2025-0142
Contact: [email protected]
Step 2: Verify Identity (before releasing data)
- Confirm identity via institutional email or secure portal
- Prevents unauthorized access to personal data
- Document verification in compliance log
Step 3: Compile Data (Right of Access)
- Export all session logs for Maria from research database
- Include metadata: collection dates, test types, physiological data
- Provide in machine-readable format (JSON) and human-readable (PDF summary)
- Document what was provided in compliance log
Step 4: Process Deletion (Right to Erasure)
Data deletion procedure:
1. Identify all locations of Maria's data:
- Research database: 12 sessions
- Analysis scripts: included in test dataset
- Backup systems: 2 copies
- Shared with collaborators: 1 institution
2. Delete from each location:
- Database: SQL DELETE executed, verified
- Scripts: Data file removed, code unchanged
- Backups: Scheduled for next backup cycle deletion
- Collaborators: Notified, deletion confirmed
3. Exceptions documented:
- Anonymized aggregate statistics retained (GDPR-compliant)
- Consent record retained (legal obligation)
Step 5: Confirmation (within 30 days, ideally sooner)
Dear Maria,
Your request has been completed:
1. ✓ Study withdrawal: Confirmed, no further data collection
2. ✓ Data access: Attached are your complete personal data records
3. ✓ Data deletion: All personal data deleted from our systems
Details:
- Sessions deleted: 12 (Jan 15 - Jan 28, 2025)
- Data types removed: Name, email, test performance, timestamps
- Retained: Anonymized statistics (no longer personal data)
- Collaborators notified: University of Example confirmed deletion
Your rights:
- You may lodge a complaint with [National Data Protection Authority]
- Contact us if you have questions: [email protected]
Thank you for your participation.
Step 6: Documentation
- Record entire process in GDPR compliance log
- Update deletion register
- Note any challenges or lessons learned
- Update procedures if gaps identified
12. Conclusion: GDPR as Research Enhancement
GDPR compliance, far from being merely a legal burden, enhances the quality and ethics of digital health research. Our privacy-first architecture demonstrates that:
1. Trust builds better data: Transparent data practices and robust privacy protections encourage honest participation and reduce dropout rates.
2. Ethics and science align: GDPR principles (transparency, minimization, purpose limitation) mirror research ethics principles (respect for persons, beneficence, justice).
3. Local-first architecture is powerful: By keeping data on participants’ devices until they explicitly choose to share, we eliminate entire categories of privacy risks while empowering participants.
4. Compliance enables collaboration: Robust GDPR compliance facilitates international research partnerships and data sharing with confidence.
5. Future-proofing: As data protection regulations strengthen globally (CCPA, PIPEDA, LGPD), GDPR compliance positions research for international applicability.
The stress testing methodology presented here—combining web-based cognitive tests with wearable physiological data—showcases how thoughtful technical architecture can satisfy both regulatory requirements and scientific needs. By implementing privacy by design, we create a sustainable, ethical, and legally compliant foundation for digital health research.
Key Takeaways for Researchers
- Start with privacy: Build GDPR compliance into research design from day one, not as an afterthought
- Empower participants: Give control over their data—it’s their right and improves trust
- Document everything: Comprehensive compliance documentation protects both participants and researchers
- Train thoroughly: Ensure all team members understand GDPR requirements and data handling procedures
- Consult experts: Engage DPOs, legal counsel, and ethics boards early and often
GDPR compliance is not merely about avoiding fines—it’s about conducting research with integrity, respecting participant autonomy, and building a foundation of trust that enables scientific progress.
References
European Union. (2016). Regulation (EU) 2016/679 of the European Parliament and of the Council (General Data Protection Regulation). Official Journal of the European Union, L119, 1-88.
Article 29 Data Protection Working Party. (2018). Guidelines on Consent under Regulation 2016/679. WP259 rev.01.
European Data Protection Board. (2020). Guidelines 3/2019 on processing of personal data through video devices. Version 2.0.
UK Information Commissioner’s Office. (2018). Guide to the General Data Protection Regulation (GDPR). ICO Publications.
Tene, O., & Polonetsky, J. (2013). Big data for all: Privacy and user control in the age of analytics. Northwestern Journal of Technology and Intellectual Property, 11(5), 239-273.
Voigt, P., & Von dem Bussche, A. (2017). The EU General Data Protection Regulation (GDPR): A Practical Guide. Springer International Publishing.
Appendix: GDPR Compliance Checklist for Researchers
Essential Documentation
- Comprehensive privacy policy (accessible before consent)
- Informed consent forms (separate for general and health data)
- Data Protection Impact Assessment (DPIA)
- Data Processing Agreements (with collaborators, service providers)
- Data retention and destruction policy
- Breach notification procedure
- Data subject request handling procedure
- Researcher training records
Technical Implementation
- Local-first data architecture (minimizes server exposure)
- Secure data export functionality (JSON/CSV)
- Encryption options for exported data
- “Clear all data” functionality for participants
- Consent management system with versioning
- Audit logging for data access (research phase)
- Regular security audits and testing
Ongoing Compliance
- Annual GDPR compliance review
- Regular researcher training updates
- Participant communication about rights
- Prompt response to data subject requests (<30 days)
- Breach monitoring and response capability
- Documentation updates as regulations evolve
- Ethics committee notifications of protocol changes
For assistance with GDPR compliance in your research:
- Contact your institutional Data Protection Officer (DPO)
- Consult your ethics committee or IRB
- Refer to your national data protection authority guidance
- Consider engaging legal counsel for complex questions
This article provides general guidance and should not be considered legal advice. Researchers should consult qualified legal professionals for specific compliance questions.