- Most workplace data (bookings, badges, sensors) counts as personal data under GDPR
- Employee consent rarely works; legitimate interest is your likely lawful basis
- Every data type needs its own minimization, retention, and deletion rules
- A DPIA is mandatory for any monitoring that profiles individual employees
- Cross-border transfers require SCCs plus a documented Transfer Impact Assessment
Workplace analytics is one of the most powerful tools for managing hybrid offices. It's also one of the easiest ways to violate GDPR. Every desk booking, badge swipe, sensor reading, and visitor log your platform collects is potentially personal data, and the regulation doesn't care whether you meant to track individuals or just wanted to know how many desks were occupied on a Tuesday. This guide walks through seven steps to make your GDPR workplace analytics program compliant, practical, and defensible.
What workplace data does GDPR regulate?
The short answer: almost everything your workplace platform touches. The longer answer requires sorting your data into categories, because not all of it carries the same risk.
Desk booking reservations record a name, a date, a time, and a location. That's personal data. It tells you where a specific person sat, when they arrived, and how often they come in. Combined with other records, it builds a detailed profile of someone's work habits.
Badge and access logs capture entry and exit timestamps, door locations, and duration of stay. Badge access systems generate a continuous stream of personal data that's hard to anonymize because the whole point is tying a credential to an identity.
Sensor occupancy data is where things get nuanced. Thermal and passive infrared (PIR) sensors detect heat signatures or motion without identifying individuals. As one industry analysis notes, thermal sensors generally fall outside GDPR personal data requirements because they can't identify who's in the room. Camera-based systems and Wi-Fi tracking (which captures MAC addresses) are a different story entirely. The EDPB treats MAC addresses as personal data. If you're evaluating workplace occupancy sensors, the sensor type you choose determines your entire compliance posture.
Visitor sign-in logs collect names, company affiliations, host information, and timestamps. Even a basic visitor management system generates personal data about non-employees, which means you're processing data for people who have no employment relationship with you at all.
Meeting room usage data can include booking names, attendee lists, frequency of use, and duration. If your system records who booked which room and who attended, that's personal data. If it only records that "Room 3A was occupied from 2pm to 3pm" with no names attached, it might qualify as anonymized.
The critical distinction: anonymized data falls outside GDPR entirely. Pseudonymized data (where you've replaced names with codes but could reverse the process) still counts as personal data and requires full GDPR compliance. A 30-day desk booking report aggregated by floor is almost certainly pseudonymized, not anonymized, because someone with access to the booking system could re-identify individuals.
Lawful basis for workplace analytics: Why consent rarely works
This is where most workplace teams get it wrong. The instinct is to ask employees for consent. It feels respectful. It feels safe. It's usually the wrong approach.
The EDPB has been explicit on this point: employee consent is unlikely to be "freely given" because of the power imbalance in the employer-employee relationship. An employee who fears that refusing consent might affect their standing, their performance review, or their job security isn't giving meaningful consent under GDPR's definition. And consent that isn't freely given isn't valid consent.
That leaves you with legitimate interest as the most practical lawful basis for workplace analytics. But legitimate interest isn't a blank check. You need to pass a three-part test, and you need to document it.
The three-part test (Legitimate Interest Assessment):
- Purpose test. Is there a genuine, specific reason for processing this data? "Optimizing office space utilization to reduce real estate costs" passes. "We might want this data someday" doesn't.
- Necessity test. Is processing this specific data actually necessary to achieve that purpose? If you can answer your space planning questions with aggregated floor-level occupancy data, you don't need individual desk-by-desk tracking tied to employee names.
- Balancing test. Do the employee's rights and expectations outweigh your legitimate interest? 70% of workers find monitoring intrusive, according to ICO research. That's a data point you can't ignore when documenting your balancing test.
Here's what this looks like in practice for different data types:
Document your Legitimate Interest Assessment for each data type. Keep it updated. Your DPO should sign off, and it should be available if a supervisory authority asks.
Data minimization practices for each workspace data type
Data minimization isn't a vague principle. It's a concrete requirement: collect only what you need, for as long as you need it, accessible only to people who need it. Here's what that looks like for each category of workplace analytics data.
Desk booking data. Collect the booking (name, desk, date, time) for operational purposes. Don't store historical booking patterns at the individual level beyond your retention window. Reports should default to team-level or floor-level aggregation. Managers don't need to see that Sarah booked Desk 14B every Tuesday for six months; they need to know that Floor 3 runs at 70% capacity on Tuesdays.
Badge and access logs. Retain raw logs for the minimum period required by your security policy (typically 30 to 90 days). After that, aggregate and anonymize. Strip individual identifiers and keep only entry counts by zone and time period. If your security team needs longer retention for incident investigation, document that justification separately.
Sensor occupancy data. If you're using thermal or PIR sensors, you're already in good shape because these don't capture personal data. If you're using camera-based or Wi-Fi tracking, apply the same minimization rules as badge data: short retention, aggregation, no individual-level dashboards. For a deeper look at the privacy tradeoffs, our guide on sensors and privacy covers the technical details.
Visitor logs. Collect name, company, host, purpose of visit, and check-in/check-out time. Don't collect government ID numbers unless legally required for your industry. Purge visitor records on a fixed schedule (90 days is common). Visitors should receive a privacy notice at sign-in explaining what you collect and why.
Meeting room usage. If your analytics platform records who booked a room, separate the booking record (personal data) from the usage record (room occupied, duration, capacity used). The usage record, stripped of names, serves your space utilization analysis without creating individual profiles.
Role-based access controls are your enforcement mechanism. Admins see booking data for operational management. Workplace leaders see team-level and floor-level occupancy trends. Employees see shared space availability and their own bookings. Nobody gets a dashboard showing individual movement patterns unless there's a documented, justified reason.
Our guide to desk booking data privacy covers what you should and shouldn't track, with practical frameworks for hybrid teams.
Read the guide
Retention and deletion policies: How long to keep workplace data
GDPR's storage limitation principle (Article 5(1)(e)) says personal data should be kept "no longer than is necessary for the purposes for which the personal data are processed." That's deliberately vague. You need to define "necessary" for each data type and write it down.
Here's a sample retention schedule. Adjust based on your legal requirements, industry regulations, and documented legitimate interests:
Automated deletion matters. Manual deletion processes fail. Someone forgets, someone's on vacation, someone doesn't realize the policy changed. Your workplace platform should support automated purge schedules so desk booking records delete after 30 days without anyone having to remember.
Legal holds are the exception. If there's an active workplace investigation, litigation, or regulatory inquiry, you may need to preserve specific records beyond your normal retention period. Document the hold, scope it narrowly (don't freeze all data for all employees), and lift it as soon as the matter resolves.
Anonymization vs. deletion. You don't always have to delete. If you can truly anonymize the data (irreversibly, so no one can re-identify individuals), the anonymized dataset falls outside GDPR and can be retained indefinitely for trend analysis. But "truly anonymized" is a high bar. If your dataset has only three people on Floor 5 on Fridays, aggregating by floor and day still makes individuals identifiable. Test your anonymization against re-identification risk before relying on it.
Running a DPIA for workplace technology
A Data Protection Impact Assessment isn't optional for most workplace analytics deployments. GDPR Article 35 requires a DPIA when processing is "likely to result in a high risk to the rights and freedoms of natural persons." Systematic monitoring of employees in a workplace almost always qualifies.
Here's a step-by-step DPIA framework adapted for workplace technology:
Step 1: Describe the processing
Write a plain-language description of what your workplace platform does with personal data. Be specific:
- Purpose: "Optimize office space utilization and reduce real estate costs across three European offices."
- Data categories: Desk bookings (name, date, time, location), badge entry/exit logs, thermal sensor occupancy counts, visitor sign-in records, meeting room booking names.
- Data subjects: Employees, contractors, visitors.
- Recipients: Workplace operations team (full access), department managers (team-level aggregated reports), facilities vendor (anonymized occupancy data only).
- Lawful basis: Legitimate interest (documented LIA on file).
Step 2: Assess necessity and proportionality
For each data type, answer: could you achieve the same purpose with less data? If you're collecting individual badge swipe times to understand peak office hours, could anonymized entry counts by 30-minute intervals serve the same purpose? If yes, the individual-level collection fails the necessity test.
Step 3: Identify and rate risks
Build a risk matrix. Common risks for workplace analytics include:
Function creep deserves special attention. Data collected to optimize meeting rooms has a way of ending up in conversations about who's "really" coming to the office. Your DPIA should explicitly prohibit this, and your employee privacy policies should make the boundaries clear to everyone.
Step 4: Define mitigation measures
For each risk rated Medium or above, document specific controls:
- Unauthorized access: Role-based access controls; quarterly access reviews; audit logging.
- Function creep: Written policy prohibiting use of workplace analytics for performance evaluation; annual training for managers; technical controls preventing individual-level exports.
- Re-identification: Minimum aggregation thresholds (e.g., suppress data for groups smaller than 10); k-anonymity testing on published reports.
- Data breach: Encryption at rest and in transit; incident response plan with 72-hour notification procedure.
- Chilling effect: Transparent communication to employees about what's collected and why; employee access to their own data; regular feedback channels.
Step 5: Consult and document
Your DPO must review and sign off on the DPIA. If your risk assessment shows residual high risks that you can't mitigate, you're required to consult your supervisory authority before proceeding. In practice, this is rare if you've done the mitigation work properly, but document your reasoning either way.
Keep the DPIA as a living document. Review it annually, or whenever you add new data sources, change platforms, or expand to new office locations.
Cross-border data transfers: SCCs, DPF, And transfer impact assessments
If your company operates offices in multiple countries, or if your workplace analytics platform processes data outside the EEA, you need to address cross-border transfers. Post-Schrems II, this isn't something you can hand-wave.
When transfers happen
You might not realize data is leaving the EEA. Common scenarios:
- Your workplace platform is hosted on US-based cloud infrastructure (AWS us-east, Azure US regions, Google Cloud US).
- Your global workplace team in New York accesses booking data from your London and Berlin offices.
- Your analytics vendor processes occupancy data in a non-EEA data center.
- Your IWMS platform syncs data across regions for consolidated reporting.
Transfer mechanisms
EU-US Data Privacy Framework (DPF). If your vendor is DPF-certified, transfers to the US are covered. Check the Data Privacy Framework list to verify certification. But don't stop there; DPF certification can be withdrawn, so your contracts should include fallback mechanisms.
Standard Contractual Clauses (SCCs). The default mechanism for transfers to countries without an adequacy decision. Since December 2022, all contracts must use the updated SCCs (the old ones are invalid). Your Data Processing Agreement with your workplace platform vendor should incorporate SCCs as an annex.
Transfer Impact Assessment (TIA). Even with SCCs in place, you need to assess whether the destination country's laws undermine the protections SCCs provide. A TIA for workplace analytics data should evaluate:
- What data transfers? Desk bookings, badge logs, visitor records, or only aggregated reports?
- What laws apply in the destination country? Government surveillance laws, law enforcement access provisions.
- What supplementary safeguards are in place? Encryption in transit and at rest, pseudonymization before transfer, access controls limiting who in the destination country can view personal data.
- Can you limit the transfer? If your platform offers EU data residency (keeping personal data in EEA data centers with only anonymized aggregates transferred globally), that eliminates most transfer risk.
Gable's EU data residency option and role-based access controls address this directly: personal booking and badge data stays in EEA infrastructure, while global workplace leaders access only aggregated, non-personal reports. That architecture simplifies your TIA documentation considerably.
Practical checklist for cross-border compliance
- [ ] Verify your vendor's DPF certification status (if US-based)
- [ ] Confirm updated SCCs are incorporated in your DPA
- [ ] Complete a Transfer Impact Assessment for each data flow leaving the EEA
- [ ] Document supplementary safeguards (encryption, pseudonymization, access controls)
- [ ] Review annually or when vendor infrastructure changes
Gable helps workplace teams collect and analyze space data with compliance and privacy in mind.
Learn more
Handling data subject access requests for workplace data
Employees have the right to request all personal data you hold about them. That includes their desk booking history, badge swipe records, visitor logs where they were the host, and any analytics derived from their individual data. You have 30 calendar days to respond.
What a workplace DSAR typically covers
When an employee submits a DSAR, you need to search across every system that holds their personal data. For workplace analytics, that means:
- Desk booking records: Every reservation they made, including date, time, location, and any cancellations or no-shows.
- Badge/access logs: Entry and exit timestamps, door locations, duration calculations.
- Meeting room bookings: Rooms they reserved, attendee lists they created, recurring booking patterns.
- Visitor logs: Records where they were listed as the host.
- Analytics outputs: Any reports, dashboards, or exports that contain their individual data (not aggregated team data).
What you can withhold
Not everything goes in the response. You can redact:
- Third-party personal data. If a meeting room booking shows other attendees' names, redact those names unless the other individuals consent to disclosure.
- Management forecasting. If you've used workplace data as one input into workforce planning decisions that haven't been communicated yet, this may be exempt under the management forecasting exemption (check your local implementation of GDPR).
- Legal privilege. If workplace data is part of an ongoing legal matter, consult your legal team before disclosing.
Response template framework
Structure your DSAR response consistently:
- Acknowledgment (within 3 business days of receipt): Confirm you've received the request, verify the requester's identity, state the 30-day deadline.
- Data compilation: Search all workplace systems. If you're running multiple platforms (booking tool, access control, visitor management, analytics dashboard), search each one. A unified platform that consolidates these data categories makes this dramatically faster.
- Review and redaction: Remove third-party data, apply exemptions, flag anything for legal review.
- Response package: Provide the data in a commonly used electronic format (CSV, PDF). Include: the categories of data processed, the purposes of processing, the retention period, the employee's rights (rectification, erasure, restriction, complaint to supervisory authority).
- Documentation: Log the request, your response, and the timeline. You'll need this if the employee escalates to a supervisory authority.
Common pitfalls
Don't ask why. Employees don't need to justify a DSAR. Asking "why do you want this?" creates the impression you're trying to discourage the request.
Don't delay. 30 days is the maximum, not the target. If you can respond in 10 days, do it. Extensions (up to 60 additional days for complex requests) require written justification to the employee.
Don't forget derived data. If your analytics platform has calculated an "office attendance score" or "collaboration index" for the employee, that's personal data too. Include it.
For organizations managing compliance programs across multiple jurisdictions, building a standardized DSAR workflow for workplace data saves significant time when requests come in.
Putting it all together: Your GDPR workplace analytics compliance checklist
Here's the consolidated checklist. Print it, share it with your DPO, and work through it systematically:
Data inventory
- [ ] Map every workplace data type you collect (bookings, badges, sensors, visitors, meeting rooms)
- [ ] Classify each as personal data, pseudonymized, or anonymized
- [ ] Document data flows (where it's collected, stored, processed, and who accesses it)
Lawful basis
- [ ] Complete a Legitimate Interest Assessment for each data type
- [ ] Document the three-part test (purpose, necessity, balancing)
- [ ] Get DPO sign-off
Minimization
- [ ] Default all reports to aggregated/team-level views
- [ ] Implement role-based access controls
- [ ] Remove unnecessary data fields from collection forms
Retention
- [ ] Set automated deletion schedules per data type
- [ ] Test anonymization against re-identification risk
- [ ] Document legal hold procedures
DPIA
- [ ] Complete a DPIA for your workplace analytics deployment
- [ ] Review and update annually
- [ ] Consult supervisory authority if residual high risks remain
Cross-border transfers
- [ ] Verify vendor DPF certification or SCC incorporation
- [ ] Complete Transfer Impact Assessments
- [ ] Implement supplementary safeguards
DSAR readiness
- [ ] Build a standardized DSAR response workflow
- [ ] Test response time (can you compile all workplace data within 30 days?)
- [ ] Train your workplace ops team on handling requests
Employee communication
- [ ] Publish a clear privacy notice explaining what workplace data you collect and why
- [ ] Make the notice accessible (not buried in an intranet page nobody reads)
- [ ] Provide a feedback channel for privacy concerns
GDPR compliance for workplace analytics isn't a one-time project. It's an ongoing practice. Regulations evolve, your office footprint changes, you add new sensors or platforms, and employee expectations shift. The companies that treat this as a living program, not a checkbox exercise, are the ones that avoid the fines and, more importantly, maintain the trust that makes workplace data useful in the first place. Fines can reach €20 million or 4% of annual global turnover. But the real cost of getting this wrong is employees who stop trusting your workplace tools and start finding workarounds that make your data useless anyway.
From role-based access and SSO to SOC 2 Type II auditing and GDPR alignment, Gable helps workplace teams collect the data they need without the compliance headaches.
Get a demo



