PrivacyCache← All articles
Privacy Engineering

Privacy Due Diligence in M&A: What Acquirers Actually Look For

7 min read

Privacy compliance is no longer a back-office concern during M&A transactions. It's a front-page diligence item that directly affects deal terms, valuation multiples, and sometimes whether the deal closes at all.

The shift happened gradually, then suddenly. GDPR enforcement scaled up. Data breach notifications became mandatory and public. Regulatory fines reached the billions. And acquirers — who inherit the target's compliance posture, including its liabilities — started paying attention.

Why Privacy Matters in M&A

Inherited Liability

When you acquire a company, you acquire its compliance history. Open DPA investigations, pending DSAR complaints, and undisclosed data breaches become your problem. Post-acquisition, the surviving entity is responsible for the target's historical processing activities.

The Marriott-Starwood acquisition is the canonical example. Marriott acquired Starwood in 2016 and inherited a data breach that had been ongoing since 2014 but wasn't discovered until 2018. The ICO's resulting fine of GBP 18.4 million was levied against Marriott, not Starwood.

Valuation Impact

Privacy risk is quantified and priced into deals. Common adjustments:

A target with strong, documented compliance practices commands a premium. A target with gaps accepts a discount — or faces indemnity requirements that shift the financial risk back to the sellers.

Integration Complexity

Post-merger integration of two organizations' data processing activities triggers new compliance requirements:

The better the target's compliance documentation, the faster and cheaper integration is.

What Due Diligence Teams Investigate

1. Data Inventory and Mapping

The first request is always some version of: "Show us your Record of Processing Activities."

Diligence teams want to see:

What they're really assessing: does this organization know what data it has and why it has it?

Red flags: No formal data inventory. Spreadsheet last updated 18 months ago. Systems processing data that aren't documented.

2. DSAR Handling Track Record

Diligence teams request:

What they're assessing: is this organization operationally capable of handling data subject rights?

Red flags: No tracking system. Average response time exceeding the legal deadline. Open complaints with DPAs.

3. Data Processing Agreements

The DPA audit is straightforward but surprisingly often reveals gaps:

Red flags: Missing DPAs for major processors. DPAs that predate GDPR and haven't been updated. No sub-processor management process.

4. Consent Mechanisms

If the target relies on consent as a legal basis for any processing:

Red flags: Pre-ticked boxes. Bundled consent. No mechanism to withdraw. Consent records that can't be produced.

5. Breach History and Response

Red flags: Unreported breaches. Repeated similar incidents. No documented incident response plan.

6. Retention and Deletion Practices

Red flags: No retention schedule. No evidence of deletion. Indefinite data retention.

Preparing for Privacy Due Diligence

If you expect your organization to undergo due diligence — whether for acquisition, investment, or partnership — preparation starts well before the process begins.

Build a Deal Pack

A Deal Pack is a pre-assembled evidence package that demonstrates compliance across all key areas:

  1. Data Inventory Export: Complete, current, with legal bases and retention periods
  2. DSAR Process Documentation: Policies, procedures, and sample case evidence
  3. Retention Verification Records: Evidence that deletion policies are followed
  4. Evidence Vault Contents: Hash-locked screenshots and documentation
  5. Hash Manifest: Cryptographic proof of evidence integrity

The hash manifest is particularly powerful in a diligence context. When every piece of evidence is SHA-256 hashed at the point of capture, the acquirer can independently verify that nothing was fabricated or modified for the transaction.

Maintain Continuous Compliance

Due diligence isn't a one-time event you prepare for. It's a snapshot of your ongoing compliance practice. If you maintain:

...then due diligence preparation is simply exporting what you already have. The organizations that struggle are those trying to reconstruct years of compliance evidence in the weeks between signing a letter of intent and the diligence team's first request.

Address Known Gaps Proactively

Every organization has compliance gaps. Acknowledging and documenting them — with a remediation plan and timeline — is far better than having them discovered during diligence.

Common remediable gaps:

The Deal Readiness Score

Organizations increasingly use readiness metrics to quantify their compliance posture:

A weighted score across these dimensions gives both the organization and potential acquirers a quantitative measure of compliance readiness. Tracking this score over time demonstrates a trajectory of improvement.

Key Takeaways

Stay ahead of privacy regulations

Get compliance insights delivered to your inbox — new regulations, enforcement actions, and practical tips.

We respect your privacy. Privacy Policy

Related articles

Privacy Engineering23 min read

How to Prove Privacy Compliance to Enterprise Buyers

Enterprise procurement now demands proof of privacy compliance, not self-attestation. Learn what buyers look for and how to become evidence-ready for vendor assessments.

Privacy Engineering6 min read

Why Evidence Collection Is the Missing Piece of Privacy Compliance

How to move from 'we are compliant' to 'we can prove it' with systematic evidence capture, hash-locked documentation, and audit-ready evidence vaults.

Track real GDPR enforcement actions

Monitor fines from 30+ European data protection authorities. Understand what violations get penalized and benchmark your risk.

Browse Enforcement Actions