Skip to content

GDPR

What GDPR Is

GDPR is the General Data Protection Regulation — the EU’s core law governing how organizations collect, use, store, and share personal data. It applies to any organization that processes personal data of people in the EU/EEA, even if the organization itself is outside the EU.

Why GDPR Matters in EV Charging

EV charging systems often process personal data, for example:
– Driver accounts (name, email, phone)
– RFID identifiers linked to a person
– Payment data (via PSPs) and invoices
– Charging session history (timestamps, locations, kWh)
– Vehicle identifiers (sometimes), support tickets, app telemetry
Because charging data can reveal location and behavior, GDPR compliance is especially important.

Key GDPR Concepts (Practical)

Personal data: any info that can identify a person directly or indirectly (including persistent IDs).
Controller vs processor: who decides “why/how” data is processed (controller) vs who processes on behalf of the controller (processor).
Lawful basis: you need a legal reason to process data (contract, consent, legitimate interest, legal obligation, etc.).
Purpose limitation & data minimization: collect only what you need, use it only for defined purposes.
Retention: keep data only as long as necessary.
Security: appropriate technical and organizational measures (access control, encryption, logging).
Data subject rights: access, deletion, rectification, portability, objection, etc.
International transfers: rules for sending EU personal data outside the EEA.

Typical GDPR Touchpoints in Charging Operations

– CPMS and user app account management
– Roaming (sharing token/session data with partners)
– Customer support and ticketing logs
– Analytics dashboards and driver behavior analytics
– Forensic logging (avoid logging unnecessary PII)
– Billing and VAT invoicing (retention often driven by legal obligations)

What “Good” Looks Like (EV Charging Context)

– Clear privacy notice explaining what data is collected and why
– Role-based access in CPMS and support tools
– Pseudonymization where possible (token IDs not directly readable as people)
– Data processing agreements (DPAs) with vendors and roaming partners
– Defined retention schedule (sessions, invoices, logs, support tickets)
– Security controls: mTLS/device identity, encryption, audit logs, incident response plan
– DPIA (Data Protection Impact Assessment) for higher-risk processing (often relevant for location/behavior analytics)

Common Pitfalls

– Treating RFID IDs as “not personal” (they often become personal when linkable)
– Keeping session/location data forever “for analytics”
– Sharing more data than necessary in roaming or exports
– No clear controller/processor roles between site owner, CPO, and CPMS vendor
– Logging PII in debug logs without retention limits and access controls

Personal data
Data minimization
Controller / processor
Data processing agreement (DPA)
Forensic logging
Cybersecurity