Alex is Sprintlaw’s co-founder and principal lawyer. Alex previously worked at a top-tier firm as a lawyer specialising in technology and media contracts, and founded a digital agency which he sold in 2015.
Confidential information is often your most valuable asset - think pricing models, source code, supplier terms, customer data and growth plans. When that information leaks, the damage can be immediate and expensive.
If you’re wondering what happens if confidentiality is breached in your business, you’re in the right place. In this guide, we break down the legal and commercial implications of breaching confidentiality under UK law, what to do in the first 72 hours, and the practical steps to reduce risk so you’re protected from day one.
What Counts As A Breach Of Confidentiality?
A breach of confidentiality happens when information that’s meant to be kept secret is disclosed, used or accessed without permission. That breach could be accidental (e.g. emailing a document to the wrong recipient) or deliberate (e.g. an ex-employee forwarding a client list to a competitor).
In a business context, breaches typically involve one or more of the following:
- Employees or contractors sharing confidential business information without authorisation.
- Suppliers or partners misusing information you provided under a contract or NDA.
- Cyber incidents exposing personal data or trade secrets (lost laptop, phishing, ransomware, misconfigured cloud storage).
- Public disclosure through a pitch, event or marketing material that inadvertently reveals confidential details.
Whether information is “confidential” depends on the circumstances. Generally, it should have the necessary quality of confidence (it’s not public knowledge), be shared in circumstances importing an obligation of confidence, and be used or disclosed without permission.
Legal Consequences Under UK Law
The consequences of breaching confidentiality depend on the type of information, your contracts, and who’s involved. In the UK, several legal routes can apply - sometimes all at once.
1) Contract Claims (Including NDAs And Confidentiality Clauses)
If your contracts include confidentiality obligations - for example, in a services agreement, employment contract or a Non-Disclosure Agreement - a breach can give rise to a straightforward claim for breach of contract. Remedies can include:
- Injunctions to stop further use or disclosure (including urgent “springboard” injunctions to remove an unfair head start).
- Damages to compensate your losses (e.g. lost profits, wasted spend).
- Account of profits (handing over profits gained from the misuse).
- Orders for delivery up and destruction of confidential materials.
- Termination rights under the contract.
Good drafting makes enforcement easier. Clear definitions of “Confidential Information”, specific restrictions on use, and practical obligations (return, destruction, security) help you act quickly if things go wrong.
2) Equitable Duty Of Confidence (Common Law)
Even without a contract, the courts can protect information under the common law (the equitable duty of confidence). If information is inherently confidential and shared in circumstances importing a duty of confidence, you may still obtain injunctions and damages for misuse. This is often used against ex-employees and third parties who receive information they knew (or ought to have known) was confidential.
3) Data Protection And Privacy (UK GDPR And Data Protection Act 2018)
Where personal data is involved (customer data, employee records, CCTV, etc.), a confidentiality breach may also be a personal data breach under the UK GDPR and Data Protection Act 2018. Consequences can include:
- Regulatory investigations and fines by the ICO (potentially significant for serious failures).
- Mandatory reporting to the ICO within 72 hours if the breach is likely to risk individuals’ rights and freedoms, and notification to affected individuals when there’s a high risk.
- Compensation claims from affected individuals for material or non-material damage (e.g. distress).
- Enforcement action requiring remedial steps (security improvements, training, audits).
Your compliance posture matters: having an up-to-date Privacy Policy, appropriate Data Processing Agreement terms with processors, and a tested Data Breach Response Plan can reduce the impact, demonstrate accountability, and lower enforcement risk.
4) Intellectual Property And Trade Secrets
Some confidential information is also protected as intellectual property or “trade secrets”. If someone lifts your source code, design files, formulas or databases, you may have concurrent IP claims (e.g. copyright infringement) alongside breach of confidence. This widens your options for injunctions and damages and can increase the pressure to settle quickly.
5) Employment Law Consequences
If an employee breaches confidentiality, you may be able to take disciplinary action, up to and including dismissal for gross misconduct - but only if you follow a fair process and your policies and contracts support it. Failing to act fairly can lead to unfair dismissal or whistleblowing-related claims, which can be more costly than the original breach. Having a clear Workplace Policy and robust contracts will help you act confidently and lawfully.
6) Business And Commercial Implications
Beyond the courtroom, the fallout can be immediate:
- Reputational damage and loss of customer trust (especially after data breaches).
- Lost bids or partnerships if proprietary strategies or pricing are leaked.
- Increased cyber insurance premiums and more onerous due diligence from enterprise clients.
- Team disruption if disciplinary processes and investigations drag on.
These practical impacts often dwarf the direct legal costs - another reason to respond fast and tighten your controls.
What Happens If Confidentiality Is Breached In Your Business? A 72-Hour Response Plan
Speed and structure matter. Here’s a pragmatic playbook you can adapt to your business size and industry.
Step 1: Contain And Preserve
- Isolate affected systems or accounts (reset credentials, revoke access, lock devices).
- Stop the spread (take down links, contact recipients to secure/delete mis-sent files, disable sharing).
- Preserve evidence (system logs, email trails, device images) - you’ll need it for investigation, insurers and, if relevant, the ICO.
Step 2: Triage What Was Exposed
- Identify the type of information (personal data, trade secrets, commercially sensitive docs).
- Map who was affected (customers, employees, partners) and the volume and sensitivity of the data.
- Assess business impact (client contracts at risk, regulatory deadlines, PR issues).
Step 3: Check Your Legal Obligations
- Data protection: decide if the breach meets the UK GDPR threshold to notify the ICO within 72 hours and whether you must notify affected individuals.
- Contractual notices: check your customer and supplier agreements for breach notification clauses.
- Employment: if staff are involved, plan a fair and prompt investigation in line with your disciplinary policy.
Step 4: Engage Your Support Team
- Legal: consider urgent injunctions (especially for ex-staff) and prepare regulatory and contractual notifications.
- Forensics/IT: understand root cause, scope and what to fix immediately.
- Communications/PR: prepare clear and accurate messaging for customers, partners and your team.
- Insurance: notify your cyber or professional indemnity insurer within policy timeframes.
Step 5: Notify Where Required
- File an ICO report if the breach is likely to risk individuals’ rights and freedoms. Don’t wait for complete certainty - initial reports can be updated.
- Notify affected individuals when required, using plain language and actionable advice (e.g. password resets, fraud monitoring).
- Send contractual notices to key clients to preserve relationships and demonstrate control.
Step 6: Remediate And Learn
- Close security gaps, rotate keys and implement technical guardrails (MFA, least privilege, DLP, encryption).
- Refresh staff training focused on real incidents and common mistakes.
- Update policies and contracts to reflect lessons learned, and rehearse your response plan.
If the breach involves staff conduct, read our practical guide to confidentiality breaches at work for employer-specific steps and pitfalls.
How To Reduce The Risk: Contracts, Policies And Training That Actually Work
Prevention is always cheaper than remediation. A few focused measures can dramatically lower your exposure.
Lock In Contracts That Protect You
- Use a tailored Non-Disclosure Agreement before sharing sensitive details with prospects, suppliers, advisors or investors.
- Build confidentiality and IP clauses into your customer, supplier and contractor agreements so obligations are clear and enforceable.
- For data processing by third parties (e.g. hosting, CRM, payroll), ensure you have a robust Data Processing Agreement and, where relevant, a Data Sharing Agreement to define roles and responsibilities under UK GDPR.
Get Your Privacy And Security House In Order
- Publish and follow an accurate, UK-specific Privacy Policy that reflects your data flows and retention practices.
- Adopt a written Data Breach Response Plan and test it with tabletop exercises.
- Implement access controls (least privilege), encryption at rest/in transit, MFA, secure email settings (DKIM/SPF/DMARC), and logging/alerting.
Strengthen Employment Documents And Culture
- Ensure your employment contracts include clear confidentiality clauses, IP assignment and post-termination restrictions proportionate to the role.
- Back them up with a practical Workplace Policy covering confidential information, BYOD, remote work, acceptable use, social media and reporting obligations.
- Deliver short, scenario-based training so people know exactly what’s confidential and how to handle it (and make it part of onboarding).
Operational Habits That Make A Difference
- Use project-specific data rooms and expiring links instead of emailing attachments.
- Watermark sensitive documents and track access to spot unusual behaviour early.
- Segment confidential information so not everyone has access to everything.
- Agree a clean handover process when staff leave (return devices, revoke accounts, confirm destruction of materials).
It can feel like a lot, but you don’t need to do everything at once. Start with the high-impact steps above and build out from there. If your contracts or policies haven’t been reviewed in a while, prioritise that - it’s the fastest way to close obvious gaps.
Can You Discipline Or Dismiss For Breaching Confidentiality?
Often, yes - but process is everything. Breaching confidentiality can be gross misconduct, particularly where the act is deliberate or causes serious risk. However, as an employer you should:
- Follow a fair investigation and disciplinary process (e.g. invite to a hearing, allow representation, consider mitigation).
- Apply your policies consistently and keep clear records of the evidence and decisions.
- Use proportionate sanctions (warning to dismissal) depending on the facts.
Unfair dismissal claims, whistleblowing protections and discrimination risks all sit in the background here. Make sure your contracts and policies back you up, and consider taking advice before termination. Our guide on breach of employment contract explains how contractual obligations and disciplinary action interact in practice.
Where the breach involves an ex-employee exploiting confidential information post-termination, you may also consider urgent injunctions and forensic preservation of evidence alongside the disciplinary route. Move quickly if you need to protect client relationships or stop a competitor gaining a head start.
Key Takeaways
- Breach of confidentiality consequences in the UK span contract claims, common law duties, data protection enforcement and employment law - the right route (or combination) depends on what was disclosed and by whom.
- Courts can award injunctions, damages and account of profits, and the ICO can require notifications and impose fines for personal data breaches under UK GDPR.
- In the first 72 hours, contain the incident, triage what was exposed, check legal obligations (including ICO reporting), engage advisors, notify as required, and fix root causes.
- Reduce risk with the right foundations: NDAs and contract clauses, a UK-compliant Privacy Policy, DPAs with processors, a tested Data Breach Response Plan, and clear employment policies and training.
- You can discipline or dismiss for serious breaches, but only if you follow a fair process and your contracts and policies support the action.
- Getting tailored documents and response playbooks in place now will save you time, stress and cost if an incident happens later.
If you’d like help tightening your contracts and policies or responding to a live incident, you can reach us at 08081347754 or team@sprintlaw.co.uk for a free, no-obligations chat.


