Skip to main content
SwiftCase
PlatformSwitchboardFeaturesSolutionsCase StudiesFree ToolsPricingAbout
Book a Demo
SwiftCase

Workflow automation for UK service businesses. Created in the UK.

A Livepoint Solution

Platform

  • Platform Overview
  • Workflow Engine
  • Case Management
  • CRM
  • Document Generation
  • Data Model
  • Integrations
  • Analytics

Switchboard

  • Switchboard Overview
  • Voice AI
  • Chat
  • Email
  • SMS
  • WhatsApp

Features

  • All Features
  • High-Volume Operations
  • Multi-Party Collaboration
  • Contract Renewals
  • Compliance & Audit
  • Pricing
  • Case Studies
  • Customers
  • Why SwiftCase

Company

  • About
  • Our Team
  • Adam Sykes
  • Nik Ellis
  • Implementation
  • 30-Day Pilot
  • Operations Pressure Map
  • For Your Role
  • Peer Clusters
  • Engineering
  • Careers
  • Partners
  • Press
  • Research
  • Tech Radar
  • Blog
  • Contact

Resources

  • Use Cases
  • Software
  • ROI Calculator
  • Pressure Diagnostic
  • Pilot Scope Estimator
  • Board Case Builder
  • Free Tools
  • Guides & Templates
  • FAQ
  • Compare
  • Glossary
  • Best Practices
  • Changelog
  • Help Centre

Legal

  • Privacy
  • Terms
  • Cookies
  • Accessibility

Stay in the loop

Cyber Essentials CertifiedGDPR CompliantUK Data CentresISO 27001 Standards

© 2026 SwiftCase. All rights reserved.

  1. Home
  2. Guides
  3. Data Protection
  4. Third-Party Data Sharing Agreements for Insurance
Data ProtectionData Sharing

Third-Party Data Sharing Agreements for Insurance

How to structure compliant data sharing across insurer, broker, and MGA relationships — covering controller vs processor roles, contractual requirements, and practical implementation.

11 min readLast updated 2025-02-07Last verified 2026-02-18

The Complexity of Insurance Data Flows

The insurance distribution chain involves multiple parties sharing personal data at every stage of the policy lifecycle. A single policyholder record may flow between the retail broker, wholesale broker, MGA, insurer, reinsurer, claims administrator, loss adjuster, and various outsourced service providers. Each data flow creates a potential compliance gap if the controller-processor relationship is not correctly identified and documented.

The ICO has repeatedly highlighted inadequate data sharing arrangements as a common failing in the financial services sector. In the ICO Data Sharing Code of Practice (in force since 2021; currently under review), the regulator emphasised that organisations must have a clear legal basis for every data share, must document the controller-processor status of each party, and must put appropriate contractual safeguards in place before any personal data is shared.

Insurance firms face particular difficulty because the same party may act as controller for some processing activities and processor for others. A broker, for example, is typically a controller for its own advisory activities but may act as a processor when handling data on behalf of an insurer under a delegated authority arrangement. Getting these relationships wrong can result in inadequate contractual protections and unclear accountability when things go wrong.

Structuring Compliant Data Sharing

Effective data sharing governance starts with accurately mapping every data flow and correctly categorising each party as controller, joint controller, or processor for each specific processing activity. This categorisation determines which contractual framework applies: data sharing agreements for controller-to-controller transfers, or Article 28 data processing agreements for controller-to-processor arrangements.

For the insurance sector, a pragmatic approach recognises that many relationships involve elements of both. A wholesale broker placing business in the London Market may be a controller for its broking activities but a processor for specific delegated functions. Your agreements need to be sufficiently granular to address this dual status.

Technology solutions that enforce data sharing controls — restricting data access to authorised parties, logging all data transfers, and maintaining audit trails of what data was shared, with whom, and for what purpose — provide the operational foundation for contractual compliance and demonstrate accountability to the ICO.

Clear accountability for every data flow in the insurance distribution chain
Compliant Article 28 agreements with all processors and sub-processors
Documented lawful basis for every controller-to-controller data share
Automated audit trails of all third-party data transfers
Reduced risk of data breach through controlled, logged sharing mechanisms
Stronger negotiating position with commercial partners on data terms

Implementing Compliant Data Sharing Arrangements

Follow these steps to map, document, and control data sharing across your insurance relationships.

1

Map All Third-Party Data Flows

Create a comprehensive data flow map covering every party with whom you share personal data. For each flow, document: what categories of personal data are shared, the purpose of the sharing, the direction of the flow, the volume and frequency of transfers, and the technical mechanism used (API, portal, email, physical media). Include both routine and ad-hoc data sharing.

Map data flows at the product level — a commercial combined policy may involve different data sharing arrangements from a personal lines motor policy. Product-level mapping ensures you capture all the nuances.
2

Determine Controller-Processor Status

For each data sharing relationship, apply the ICO guidance to determine whether each party is a controller, joint controller, or processor. The key question is: who determines the purposes and means of processing? In insurance, brokers typically control their advisory processing, insurers control underwriting and claims decisions, and outsourced service providers are usually processors acting on controller instructions.

Beware of "convenience labelling" — parties sometimes agree to call themselves processors when they are actually controllers, to avoid GDPR obligations. The ICO looks at the factual reality, not the contractual label.
3

Put Controller-to-Controller Agreements in Place

Where two controllers share data (e.g., broker to insurer for placement purposes), implement a data sharing agreement that documents: the lawful basis for the sharing, the categories of data subjects and personal data, the purposes for which each party will process the data, each party responsibilities for data subject rights, security requirements, and breach notification procedures.

4

Execute Article 28 Data Processing Agreements

For every processor relationship, execute a compliant Article 28 agreement covering all mandatory provisions: subject matter and duration of processing, nature and purpose, types of personal data and categories of data subjects, controller obligations and rights, processor obligations including confidentiality, security measures, sub-processing, data subject rights assistance, breach notification, audit rights, and data return or deletion at contract end.

5

Address Sub-Processing Chains

Insurance processors frequently engage sub-processors — a claims administrator may use external medical records retrieval services, or an MGA may outsource certain functions to TPAs. Under Article 28(2), processors must obtain prior written authorisation before engaging sub-processors and impose the same data protection obligations through a sub-processing agreement. Establish a sub-processor approval process and maintain a register of all approved sub-processors.

Include a contractual requirement for processors to notify you of any intended sub-processor changes at least 30 days in advance, giving you time to assess the data protection implications and object if necessary.
6

Establish Joint Controller Arrangements

Where parties jointly determine the purposes and means of processing — which can occur in co-insurance arrangements, consortium underwriting, or joint venture operations — implement Article 26 joint controller arrangements. These must define each party respective responsibilities for data subject rights, privacy notice obligations, and the point of contact for data subjects.

7

Implement Technical Data Sharing Controls

Deploy technical measures to enforce your contractual arrangements. This includes secure data transfer mechanisms (encrypted file transfer, secure APIs, access-controlled portals), role-based access controls that limit each party to only the data they need, and comprehensive logging of all data access and transfers for audit purposes.

8

Monitor and Review Sharing Arrangements

Establish ongoing monitoring of your data sharing relationships. Conduct annual reviews of all data processing agreements, audit processor compliance with contractual obligations, verify that data flows remain within the scope of your agreements, and update arrangements when business relationships or processing activities change.

Include data sharing arrangement reviews as a standing agenda item in your quarterly compliance meetings with key commercial partners — this embeds compliance into the business relationship rather than treating it as a separate exercise.

Best Practices

Use Standardised Agreement Templates

Develop standardised data processing agreement and data sharing agreement templates for your most common relationship types. This ensures consistency, reduces negotiation time, and makes it easier to monitor compliance across multiple third-party relationships.

Conduct Due Diligence Before Sharing

Before entering into a new data sharing arrangement, conduct due diligence on the third party data protection practices. Review their privacy policies, security certifications, breach history, and ICO enforcement record. For high-risk sharing arrangements, conduct an on-site or virtual data protection assessment.

Maintain a Central Third-Party Register

Keep a central register of all third parties with whom you share personal data, documenting the controller-processor status, agreement type, review dates, and risk rating for each relationship. This register should be owned by your DPO or data protection lead and reviewed at least quarterly.

Plan for Relationship Termination

Every data sharing arrangement should have clear provisions for what happens to personal data when the relationship ends. Specify whether data must be returned, deleted, or both, define timescales for completion, and require written confirmation of deletion. Test these exit provisions before you need them.

Consider International Transfer Implications

If any data sharing involves transfers outside the UK — including to group companies, offshore service centres, or cloud providers with non-UK data centres — ensure you have appropriate transfer mechanisms in place such as UK adequacy decisions, International Data Transfer Agreements, or Binding Corporate Rules.

Involve Legal Early in Commercial Negotiations

Data protection terms should be negotiated alongside commercial terms, not bolted on afterwards. Involve your legal and data protection teams early in commercial negotiations so that data sharing requirements are built into the relationship from the outset.

Implementation Checklist

Complete data flow map covering all third-party relationships

Every data sharing arrangement documented with data types, purposes, and transfer mechanisms.

Controller-processor status determined for each relationship

Factual assessment of status completed and documented, not just contractual labels.

Article 28 DPAs executed with all processors

Compliant data processing agreements in place covering all mandatory Article 28 provisions.

Controller-to-controller data sharing agreements in place

Agreements documenting lawful basis, purposes, responsibilities, and security requirements.

Sub-processor register maintained and approval process operational

All sub-processors documented with prior written authorisation and back-to-back agreements.

Technical data sharing controls deployed

Encrypted transfers, access controls, and comprehensive transfer logging in place.

Annual review schedule established for all agreements

Calendar of review dates with named owners for each third-party relationship.

Third-party data protection due diligence process documented

Free tools for data protection

Try these related tools — no sign-up required.

GDPR Data Retention Calculator

Check retention periods and deletion dates for 30+ data types.

FCA Compliance Checker

Assess your data protection obligations under FCA rules.

Frequently Asked Questions

Related Guides

data protection

UK GDPR Data Handling Obligations for Insurance Firms

A comprehensive guide to meeting your data handling responsibilities under the UK GDPR, tailored specifically for insurers, brokers, and MGAs.

data protection

Data Protection Impact Assessments for Insurance

A practical guide to the DPIA process for insurance firms, covering when assessments are required, how to conduct them, and when to consult the ICO.

fca compliance

FCA Audit Preparation Guide: Getting Your Insurance Firm Audit-Ready

A practical guide to preparing for FCA supervisory visits, skilled person reviews, and internal compliance audits — with checklists, common findings, and response strategies.

Further Reading

Platform SecurityCompliance FeaturesInsurance SolutionsFCA Compliance Checker

Control Your Insurance Data Sharing

SwiftCase enforces data sharing controls with role-based access, encrypted transfers, and complete audit logging — giving you confidence that every third-party data flow is compliant and documented.

Book a Discovery CallSee Security Features