Alex is Sprintlaw’s co-founder and principal lawyer. Alex previously worked at a top-tier firm as a lawyer specialising in technology and media contracts, and founded a digital agency which he sold in 2015.
If you’re running a small business, a “breach of privacy” can sound scary - and expensive. The good news is that with the right steps in place, you can reduce the risk dramatically and know exactly what to do if something goes wrong.
This guide explains what counts as a breach of privacy in the UK, the laws that apply to you, common pitfalls for SMEs, and a clear action plan for responding to an incident. We’ll also cover the contracts, policies and training that help you stay protected from day one.
What Counts As A Breach Of Privacy Under UK Law?
In the UK, most “privacy” breaches in a business context are data protection breaches - that is, incidents where personal data is lost, accessed or disclosed unlawfully. This is governed by the UK GDPR and the Data Protection Act 2018. A breach can be accidental or deliberate.
Personal data is any information that can identify a person: names, emails, addresses, phone numbers, IP addresses, payment details, health information, job applications, CCTV footage and more.
Examples include:
- Sending an email to the wrong recipient or using “To/CC” instead of “BCC” on a customer mailing list.
- Losing an unencrypted laptop, phone or USB drive containing client information.
- Employees accessing customer data without a valid business reason.
- Misconfigured cloud storage that exposes files to the public internet.
- Publishing CCTV with audio without proper signage or a lawful basis.
- A supplier (processor) leaking your customer data due to weak security.
Privacy breaches can also arise from confidentiality issues (for example, an employee sharing screenshots of client messages) and misuse of private information. But for most small businesses, the UK GDPR framework is the key lens for assessing and responding to incidents.
Do UK Privacy Laws Apply To My Small Business?
Almost certainly, yes. If you collect or store personal data in the UK - even basic details like names and emails - the UK GDPR applies to you. That means you must:
- Have a lawful basis for processing personal data and only use it for stated purposes.
- Process data fairly and transparently, typically explained in a clear, accessible Privacy Policy.
- Keep data accurate and no longer than necessary.
- Implement appropriate technical and organisational security measures.
- Respect individuals’ rights (access, rectification, erasure, objection, portability, etc.).
- Manage your processors (suppliers) under a written Data Processing Agreement.
On top of this, the Privacy and Electronic Communications Regulations (PECR) cover electronic marketing and cookies. If you’re sending marketing emails or texts, PECR rules apply even when data is otherwise compliant under GDPR. If you track users online, cookie consent also becomes relevant - including the need for compliant cookie banners.
It’s normal to feel overwhelmed by acronyms. The key idea is simple: if you’re handling customer or employee information, you have legal duties to protect it, be transparent and respond properly if something goes wrong.
Common Ways Small Businesses Breach Privacy (And How To Prevent Them)
Most breaches aren’t sophisticated hacks - they’re everyday mistakes that are preventable with simple controls. Here are common risk areas and practical fixes.
1) Misaddressed Emails And Mailing Lists
Risk: Using “To/CC” for bulk emails, sending sensitive information to the wrong person, attaching the wrong file.
Prevention tips:
- Use email delay rules (e.g., 2–5 minutes) so you can undo accidental sends.
- Adopt templates that avoid including personal data in subject lines or body text.
- Ensure mailing platforms automatically use BCC-equivalent functionality.
- Train staff regularly - this is one of the highest-frequency risks for SMEs.
2) Weak Cloud Security And File Sharing
Risk: Publicly shared links, misconfigured permissions, or staff using personal storage accounts with unknown security.
Prevention tips:
- Apply least-privilege access, multi-factor authentication and encryption at rest.
- Restrict external sharing by default and set link expiry dates for shared files.
- Standardise approved tools and understand how they handle data - if you’re using cloud storage, ensure your setup is actually GDPR compliant.
3) Third-Party Processors And Suppliers
Risk: A supplier (e.g., email platform, payroll provider, IT contractor) suffers a breach that exposes your customers’ data.
Prevention tips:
- Put a robust Data Processing Agreement in place with processors covering security, breach notification and sub-processing.
- Assess suppliers’ security practices before onboarding and at renewal.
- Keep a record of where personal data flows and who has access (a basic data map).
4) Marketing Without Proper Consent Or Soft Opt-In
Risk: Sending marketing emails/texts without consent or failing PECR rules around “soft opt-in”.
Prevention tips:
- Only send marketing with valid consent or where the soft opt-in applies (existing customer, similar products/services, opt-out offered at collection and in each message).
- Keep clear records of consent status and unsubscribe requests.
- Make sure your Privacy Policy and preference centre match what you actually do.
5) CCTV, Audio And Biometrics
Risk: Recording customers or staff (especially audio or biometrics) without a lawful basis, signage or impact assessment.
Prevention tips:
- Use signage and limit recording to what’s necessary. Avoid audio unless you have a strong justification.
- If you’re considering microphones or biometrics (e.g. fingerprint clocking), treat this as high risk and conduct a DPIA first.
- Read up on the risks before deploying tools like CCTV with audio or biometric clocking systems.
6) Staff Sharing Screenshots Or Messages
Risk: Team members sharing private customer messages in group chats or on social media.
Prevention tips:
- Have a clear social media and confidentiality policy.
- Train staff that even “redacted” screenshots may still identify someone.
- Understand the legal risks of sharing private messages without consent.
7) AI And New Tools
Risk: Inputting personal data into AI tools or chatbots that store prompts for training or are hosted outside the UK/EEA.
Prevention tips:
- Adopt an internal policy on AI use and block uploading of personal data unless safeguards are in place.
- Review vendors’ data handling - storage location, retention, and training settings matter.
- Follow practical ChatGPT GDPR steps if you’re experimenting with generative AI at work.
What To Do If You’ve Had A Data Breach: Step-By-Step
Speed and clarity matter. Having a written Data Breach Response Plan makes this far easier, but here’s the core playbook.
Step 1: Contain The Incident
Stop the bleeding. Disable compromised accounts, revoke access tokens, shut down affected systems, and isolate malicious devices. If an email was sent to the wrong person, politely request deletion and confirm in writing.
Step 2: Assess The Risk
Ask: what data is involved, how sensitive is it (e.g., health/financial data), how many people are affected, and what’s the likelihood of harm (identity theft, financial loss, distress, discrimination)? Consider whether data was encrypted and whether the recipient is trustworthy.
Step 3: Record Everything
Document the incident, decisions, timelines and remediation steps. The UK GDPR requires you to keep an internal breach log. This record is vital if the ICO asks questions later.
Step 4: Decide On Notification
You must notify the ICO without undue delay and, where feasible, within 72 hours of becoming aware of a personal data breach if it’s likely to result in a risk to individuals’ rights and freedoms. If the risk is high, you must also inform the affected individuals without undue delay, explaining what happened and how they can protect themselves.
If you decide not to notify, document your reasoning. If in doubt, seek legal advice - the cost of a quick consult is far less than mishandling an incident.
Step 5: Remediate And Prevent Recurrence
Fix the root cause and double down on controls: security patches, access changes, extra training, process tweaks, and supplier improvements. If marketing was involved, review consent and unsubscribe processes and whether your soft opt-in reliance was correct.
Step 6: Communicate Internally (And Sometimes Externally)
Brief key stakeholders and staff about what happened and the practical next steps. If individuals must be notified, prepare a clear, empathetic message with concrete actions they can take (e.g., changing passwords, watching for scams). Avoid speculation - stick to facts and updates.
Handling Requests And Complaints After A Breach
Breaches often trigger a spike in data rights requests and complaints. Be ready to handle them lawfully and promptly.
Subject Access Requests (SARs)
Anyone can ask for a copy of their personal data and certain information about how you process it. You usually have one month to respond. Have a standard process, know where data lives, and log deadlines carefully. If timing worries you, refresh yourself on practical SAR deadlines and how to calculate them.
In some cases, you can refuse or limit a request (for example, if it’s manifestly unfounded or excessive, or impacts others’ rights). Those situations are narrow - use them carefully and document your reasoning. It’s worth reading about relevant SAR exemptions before you rely on one.
Marketing Opt-Outs
If the incident involved mailing lists or marketing, expect additional unsubscribes. Make it easy to opt out and ensure your systems suppress marketing quickly. Review PECR compliance and whether your cookie consents and cookie banners are up to scratch.
Complaints To Your Business (And The ICO)
Respond to complaints professionally, acknowledge concerns, and explain what you’ve done to mitigate harm. Keep records of your responses. If someone complains to the ICO, they may contact you for information - having your breach log, policy documents and timeline to hand will help you resolve matters efficiently.
Contracts, Policies And Training To Protect Your Business
Privacy compliance isn’t just about IT - your contracts, policies and training are your everyday safety net. Here’s what small businesses should prioritise.
Core Documents And Controls
- Privacy Policy: Make it clear, honest and aligned to your actual practices. Keep it updated as your business evolves - your Privacy Policy should set expectations and help you meet transparency duties.
- Data Processing Agreement: Put a written Data Processing Agreement in place with any supplier that processes personal data for you (hosting, email, payroll, IT support).
- Data Sharing Agreement: If you “share” data with another controller (e.g., a partner company), use a Data Sharing Agreement to define responsibilities, lawful bases and security.
- Incident Readiness: A tailored Data Breach Response Plan with clear roles (including out-of-hours contacts) saves time and reduces mistakes.
- Consent And Notices: Review sign-up flows, in-store forms and cookie notices. If you rely on consent, make sure it’s genuine, granular and recorded - a quick consent wording review can prevent future headaches.
Operational Best Practice
- Security Hygiene: MFA everywhere, strong passwords, patching, device encryption, regular backups and access-by-role.
- Training: Short, frequent training beats annual tick-box exercises. Focus on real scenarios: misaddressed emails, phishing, lost devices, safe use of AI tools.
- Data Minimisation: Collect only what you need, delete when you don’t. Shorter retention means less to lose if something goes wrong.
- Vendor Oversight: Keep a list of your processors, review them annually, and make sure contracts match reality.
- Workplace Monitoring: If you monitor staff, be transparent, proportionate and lawful - for instance, think carefully before reviewing browsing activity and understand when employers can monitor internet search history at work.
If some of this sounds daunting, don’t stress - the goal is progress, not perfection. Start with the highest risks for your business, get the fundamentals in place, and build from there.
Frequently Asked Questions About UK Privacy Breaches
Is Every Data Incident Notifiable To The ICO?
No. You only need to notify the ICO if the breach is likely to result in a risk to individuals’ rights and freedoms. If the risk is high, you must also notify affected individuals. When you decide not to notify, document why (include the risk assessment and mitigating factors like encryption).
What’s The Deadline To Notify?
Notify the ICO without undue delay - and where feasible, within 72 hours of becoming aware of the breach. If you notify late, explain the reasons. Don’t wait to have every detail; you can submit an initial notification and follow up with more information as you investigate.
What Are The Penalties For A Breach Of Privacy In The UK?
The ICO can issue warnings, reprimands and fines for GDPR infringements. PECR breaches (e.g., unlawful marketing) can also attract fines. The bigger risk for small businesses is reputational damage, loss of customer trust and time spent firefighting - prevention and clear communication are your best defence.
Do We Need A Lawyer For Every Breach?
Not necessarily. Minor incidents with low risk (for example, an email sent to a trusted recipient who confirms deletion) may be managed internally. However, if the incident involves sensitive data, a high number of individuals, or uncertainty about notification thresholds, tailored advice is wise - especially within the 72-hour window.
How Do Cookies And Marketing Fit Into “Privacy”?
Cookies and electronic marketing are covered by PECR alongside GDPR. This means clear consent for non-essential cookies and strict rules on direct marketing. Make sure your cookie consent tool and cookie banners are configured correctly, and that your mailing workflows comply with consent or the soft opt-in rules.
Key Takeaways
- A “breach of privacy” in the UK usually means a personal data breach under the UK GDPR. It can be accidental and still trigger legal duties.
- Most SMEs handle personal data, so GDPR and PECR almost certainly apply to your business - be transparent, secure and proportionate from day one.
- Common causes are everyday mistakes: misaddressed emails, misconfigured cloud sharing, supplier errors, and over-collection of data. Practical controls and regular training dramatically reduce risk.
- Have a clear action plan: contain, assess, record, notify the ICO within 72 hours if required, tell individuals if risk is high, and remediate at the root.
- Expect SARs and complaints after an incident; prepare with defined processes, awareness of SAR deadlines and narrow exemptions.
- Protect yourself with a tailored Privacy Policy, Data Breach Response Plan, and the right contracts with suppliers (Data Processing Agreement, Data Sharing Agreement).
- Focus on progress: prioritise quick wins (MFA, encryption, access controls), get your cookie consent and marketing practices compliant, and revisit annually.
If you’d like help putting the right documents and processes in place - or you need urgent guidance on a breach - you can reach us at 08081347754 or team@sprintlaw.co.uk for a free, no-obligations chat.


