Alex is Sprintlaw’s co-founder and principal lawyer. Alex previously worked at a top-tier firm as a lawyer specialising in technology and media contracts, and founded a digital agency which he sold in 2015.
Confidential information is the lifeblood of most small businesses - from client lists and pricing to product roadmaps and HR records. When that information leaks, the fallout can be serious and fast.
The good news? With the right structure, documents and habits, you can reduce the chance of a breach of confidentiality at work and respond confidently if one does occur.
In this guide, we’ll cover what counts as a confidentiality breach, the UK laws that apply, practical prevention steps, and a clear, no‑nonsense response plan you can follow if you’re dealing with an incident.
What Counts As A Breach Of Confidentiality At Work?
A breach of confidentiality at work is any unauthorised access, disclosure, loss, alteration or misuse of information your business is obliged to keep confidential. That can include trade secrets, customer data, supplier pricing, marketing strategies, employee records, or anything else you’ve promised to keep private (by law or contract).
Common scenarios small employers face include:
- Sending a customer spreadsheet to the wrong recipient or using CC instead of BCC.
- Losing an unencrypted laptop or phone containing work emails or files.
- Ex‑staff taking client lists, proposals or code to a competitor.
- Posting internal documents in public Slack channels or file‑sharing links with “anyone with the link” access.
- A supplier or contractor mishandling data you shared with them for a project.
Not every slip equals an employer breach of confidentiality in the legal sense - but many do, and the threshold is often lower than people think. If the information was confidential, the person was not authorised to access or share it, and there is a risk of harm (commercial, reputational, financial or privacy‑related), you should treat it as a breach and act promptly.
Which UK Laws Apply To Confidentiality Breaches?
Several legal frameworks can apply at the same time. As a small employer, you should be aware of the following:
UK GDPR And The Data Protection Act 2018
If personal data is involved (for example, customer or employee information), the UK GDPR and the Data Protection Act 2018 apply. You must implement “appropriate technical and organisational measures” to protect personal data, and if you suffer a personal data breach that is likely to result in a risk to people’s rights and freedoms, you must notify the ICO within 72 hours of becoming aware, and sometimes notify affected individuals too.
Even if notification isn’t required, you are expected to keep an internal breach log and review what went wrong.
Common Law Duty Of Confidentiality
Separate from data protection, UK common law protects confidential business information (trade secrets and other non‑public information that has the necessary quality of confidence). If an employee, contractor or partner misuses that information, you may have a claim for breach of confidence, and contractual remedies if your agreements include confidentiality clauses.
Employment Law Obligations
Confidentiality is commonly embedded in the terms of an Employment Contract and supported by clear disciplinary procedures. There is also an implied duty of fidelity while an employee is employed. However, once employment ends, you’ll need express post‑termination clauses (confidentiality, non‑solicitation, and in some cases reasonable non‑competes) to maintain protection.
Contracts With Suppliers And Processors
If third parties process personal data on your behalf (for example, a payroll provider or marketing platform), you are required to have appropriate written terms in place under UK GDPR. These terms should include specific security and breach notification obligations. For broader commercial information, robust confidentiality wording and audit rights are good practice.
Put simply: treat confidentiality breaches as a cross‑cutting risk. They rarely sit neatly in one legal box, so your preventative and response steps should cover all of the above.
How Do You Prevent An Employer Breach Of Confidentiality?
Prevention is always better than cure. A few targeted steps will dramatically reduce the chance of a confidentiality breach at work and put you in a strong position if one happens.
1) Lock In The Right Documents
- Have a clear, plain‑English Privacy Policy that matches how you actually collect and use personal data. This sets expectations and supports your GDPR compliance.
- Make sure every new hire signs an Employment Contract with strong confidentiality and IP clauses, and appropriate post‑termination restrictions where justified.
- Use a Non-Disclosure Agreement (NDA) with prospective partners, freelancers and investors before sharing sensitive information.
- Roll your day‑to‑day rules into a practical Staff Handbook, including IT, data protection, social media and remote work expectations.
- Back this up with a documented Data Breach Response Plan so your team knows exactly what to do within the first 24–72 hours.
2) Tighten Access And IT Controls
- Apply “least privilege” access - people only see what they need to do their jobs.
- Use MFA, device encryption and automatic screen locks across all accounts and devices.
- Disable downloads where possible and turn off “anyone with the link” sharing on cloud folders.
- Have a clear stance on company devices vs BYOD mobiles and what security controls apply in each case.
3) Train, Remind, Repeat
- Provide short, practical onboarding for new starters on confidentiality, phishing and safe sharing.
- Refresh training at least annually, and after any incident or policy change.
- Make it easy to report near‑misses. Early flags prevent bigger breaches.
4) Manage Third Parties Carefully
- Do basic due diligence on vendors handling confidential data (security certifications, breach history, sub‑processors).
- Use clear confidentiality and data processing terms, including incident notification and cooperation requirements.
- Record where your data lives, who can access it and on what legal basis - a living data map reduces blind spots.
5) Keep Policies Simple And Enforceable
Policies only work if people actually use them. Keep them short, practical and aligned to your tech stack. Where you have more detailed procedures (for IT or HR), reference them in a high‑level Workplace Policy and your handbook so staff can find what they need quickly.
What Should You Do After A Confidentiality Breach At Work?
Speed and structure are everything. Here’s a step‑by‑step response plan you can adapt to your business. Ideally, you’ll have this baked into your Data Breach Response Plan before you ever need it.
Step 1: Contain The Incident Immediately
- Revoke access, reset passwords and disable sharing links.
- Wipe lost or stolen devices remotely if possible.
- Pull down public posts or listings that disclose information.
Step 2: Assemble Your Response Team
Nominate a lead (often the founder/MD in a small business) and involve IT, HR and a legal contact. Keep the group small. Create one comms channel to avoid confusion.
Step 3: Work Out What Happened
- What information is involved? Is it personal data, trade secrets, financial data, or confidential client files?
- Whose data is it? How many people or records are affected?
- How did it happen? Human error, malicious insider, system vulnerability, third‑party issue?
- Is the breach ongoing, or has it been contained?
Step 4: Assess The Risk
For personal data, consider the likelihood and severity of harm to individuals (identity theft, fraud, discrimination, distress). For commercial confidentiality, consider competitive harm, contractual claims and reputational impact.
Step 5: Decide On Notifications
- ICO: If the breach of personal data is likely to result in a risk to people’s rights and freedoms, you must notify the ICO within 72 hours of becoming aware. If you miss the window, explain why.
- Individuals: If there is a high risk, you must also tell affected individuals without undue delay, in clear language, with steps they can take to protect themselves.
- Clients, partners and insurers: Check your contracts and policy terms; you may have notification obligations even if GDPR notification isn’t required.
Step 6: Take HR And Contractual Action
- Follow a fair process if employee misconduct is suspected - gather facts, invite a response, and consider disciplinary action in line with your Staff Handbook.
- Remind contractors and suppliers of their confidentiality obligations and NDA terms; consider suspension of access or termination if needed.
- For ex‑employees, enforce post‑termination restrictions and seek undertakings to stop using confidential material.
Step 7: Document Everything
Keep a complete record of the incident, decisions, timestamps and evidence gathered. For personal data, maintain your breach log even if you don’t notify the ICO. Good records reduce regulatory risk and help your insurer and legal team if claims arise.
Step 8: Fix The Root Cause
Update access controls, templates, processes and training so the same issue doesn’t happen again. Communicate the changes to staff, and schedule a quick refresher training session.
Responding by the book can feel like a lot in the moment - which is why having a simple, business‑specific plan and the right documents in place will save you time and stress when it matters.
What Contracts And Policies Should You Have “From Day One”?
To meaningfully reduce confidentiality risk, prioritise these practical tools:
- Employment Contract: Clear confidentiality, IP ownership, return of property, IT/monitoring consent and post‑termination restrictions where justified. A well‑drafted Employment Contract sets the baseline for compliant investigations and fair discipline later.
- Staff Handbook: A concise, accessible set of rules for day‑to‑day behaviour (data protection, IT use, remote work, social media, reporting incidents), ideally as a living document. Your Staff Handbook should cross‑refer to your breach response steps.
- Non-Disclosure Agreement: Use an NDA before sharing sensitive information with prospective hires, freelancers, agencies, suppliers or potential partners.
- Privacy Policy: A practical, accurate Privacy Policy that aligns with what you actually do, supported by internal data handling procedures.
- Data Breach Response Plan: A short, step‑by‑step Data Breach Response Plan assigning roles, communications, and 72‑hour decision points.
- Workplace Policy: If you prefer a modular approach, keep your core rules in a single Workplace Policy and link to IT/HR procedures employees can follow.
Also consider secure device rules for company kit versus BYOD mobiles, and make sure your processor and supplier agreements include confidentiality and breach terms that match your risk profile.
FAQs For Small Employers
Do We Have To Report Every Breach To The ICO?
No. You only need to notify the ICO if the personal data breach is likely to result in a risk to individuals’ rights and freedoms. However, you must assess every incident promptly and keep a record of your reasoning either way.
Can We Discipline Or Dismiss An Employee For A Breach?
Potentially, yes - but follow a fair process. Investigate the facts, consider intent and training history, and apply your policies consistently. Sanctions should be proportionate; for serious or deliberate misconduct, dismissal may be fair if you’ve followed a robust procedure and have the right contractual and policy framework in place.
What If A Contractor Or Supplier Causes The Breach?
You’re still responsible for protecting personal data as a controller, and you may be liable to customers or employees. Check your contracts for confidentiality, data protection and indemnity clauses, and require cooperation for notifications and remediation. This is where tailored NDAs and processing terms earn their keep.
Do We Need Consent To Monitor Devices Or Accounts?
You should be transparent about monitoring and only do what’s necessary and proportionate for legitimate aims (security, asset protection, compliance). Build the right notices into your contracts and policies, and limit access to what’s needed for an investigation.
Can We Recover Losses If Someone Steals Our Client List?
Possibly. You may have claims for breach of confidence, breach of contract and, where applicable, intellectual property infringement. Quick containment (injunctions and undertakings) is often more valuable than damages - it stops the ongoing harm. Strong contractual terms and clean evidence trails greatly improve your prospects.
Key Takeaways
- Treat confidentiality as a core business risk: build prevention into your everyday documents, training and access controls.
- Know your duties under UK GDPR/Data Protection Act 2018 and common law confidentiality - multiple legal frameworks can apply at once.
- Put the basics in place early: an Employment Contract with robust clauses, a clear Staff Handbook, a practical Privacy Policy, and a tested Data Breach Response Plan.
- If a breach happens, act within hours, not days: contain, investigate, assess risk, and decide on notifications - documenting your decisions as you go.
- Use targeted NDAs and strong supplier terms to reduce third‑party risk, and be realistic about BYOD versus company devices.
- Get tailored advice when drafting your contracts and running an investigation - the right framework reduces legal risk and speeds up a fair, defensible outcome.
If you’d like help preventing or managing a breach of confidentiality at work, you can reach us on 08081347754 or team@sprintlaw.co.uk for a free, no‑obligations chat.


