Alex is Sprintlaw’s co-founder and principal lawyer. Alex previously worked at a top-tier firm as a lawyer specialising in technology and media contracts, and founded a digital agency which he sold in 2015.
It happens in a split second - you hit send and realise the email went to the wrong person, with confidential information attached.
Don’t panic. With a calm, structured response, you can contain the damage, meet your legal obligations, and reduce the chance of a repeat.
In this guide, we’ll walk through what UK law expects when confidential or personal data is sent to the wrong email address, immediate steps to take, when to report the breach, and the practical controls and legal documents that help protect your business from day one.
What Counts As A Data Breach When Emailing The Wrong Person?
Under the UK GDPR and the Data Protection Act 2018, a personal data breach is any security incident leading to accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data. Sending personal data to the wrong recipient by email is a classic example of an unauthorised disclosure.
Key points to understand:
- Personal data is information that identifies, or could identify, a living person (for example, names, emails, addresses, payroll details, customer records, CVs, health information).
- Some data is “special category data” (such as health, biometric data, or data about racial or ethnic origin). If mis-sent, it usually increases risk and the likelihood that you must notify the Information Commissioner’s Office (ICO) and the affected people.
- If the email contains only business confidential information without personal data (like pricing spreadsheets, supplier terms, product roadmap), it may not trigger UK GDPR reporting. However, you could still face commercial, contractual, or employment confidentiality issues and need to act quickly to mitigate harm.
Either way, treat a misdirected email as a serious incident. Your response should focus on containment, legal compliance, and learning from the event.
Immediate Steps If You Sent Confidential Information To The Wrong Email
Time matters. UK GDPR requires you to assess and, where needed, report certain breaches to the ICO within 72 hours of becoming aware. Follow a clear, practical playbook:
1) Pause And Triage
- Notify your Data Protection Officer (DPO) or the person responsible for data protection in your business immediately.
- Identify what was sent, to whom, when, and how (email address, domain, internal vs external, distribution lists).
- Determine whether the information includes personal data, any special category data, or confidential business information.
2) Contain The Breach
- Use “recall” only if your organisation and the recipient both use compatible systems - it often doesn’t work with external recipients, so don’t rely on it.
- Contact the unintended recipient quickly and politely ask them to:
- Delete the email and any attachments from their inbox, deleted items, and backups; and
- Confirm in writing they won’t use, copy, or forward the information.
- If the attachment was password-protected or encrypted, confirm whether the password was shared and whether the protection remains intact.
- Do not send the data again to “fix it” - that can make the situation worse. If you must resend, use a secure channel with appropriate controls.
3) Assess Risk To People
Ask: what harm could realistically arise? Consider:
- Type and sensitivity of the data (e.g., health data or financial data increases risk).
- Volume of individuals affected.
- Whether the recipient is trustworthy (for example, a known supplier vs an unknown public domain address).
- Whether the data was protected (encryption, password, pseudonymisation).
- Potential consequences - identity theft, fraud, distress, reputational harm.
4) Record Everything
- Log the incident, decisions, risk assessment, and actions taken in your breach register.
- Keep copies of communications with the unintended recipient and any confirmations of deletion.
- Document your legal analysis on whether notification is required (to the ICO and to affected people).
5) Decide On Notification
- If the breach is likely to result in a risk to people’s rights and freedoms, you must notify the ICO without undue delay and within 72 hours of becoming aware.
- If the risk is high, you must also inform the affected individuals without undue delay, in clear and plain language, including steps they can take to protect themselves.
6) Remediate And Learn
- Take steps to prevent recurrence (email delay rules, auto-complete settings, extra checks for bulk sends).
- Deliver targeted training to the team involved and update any relevant processes or templates.
- Where appropriate, review and update your Data Breach Response Plan and technical controls.
Do You Need To Report The Breach To The ICO Or Tell Anyone?
Not every incident needs to be reported to the ICO. The threshold is whether the breach is likely to result in a risk to people’s rights and freedoms. In practice, ask yourself:
- Could the data be used to cause harm (financial loss, identity theft, discrimination, reputational damage, distress)?
- Is the data sensitive or extensive (for example, payroll reports, copies of IDs, medical information)?
- Was the recipient unknown, external, or uncooperative in deleting the data?
- Was the data unencrypted and in a readily usable format?
If the answer to these questions points to risk, report to the ICO within 72 hours of awareness. If you miss the 72-hour window, you should still report and explain the delay.
When people face a high risk of harm, you must also inform them. Your message should be empathetic and practical. It should explain what happened, what data was involved, what you’re doing about it, and specific steps they can take (for example, resetting passwords, monitoring accounts, contacting their bank).
Even if you decide not to report, you must keep an internal record of the incident and your reasoning. The ICO can ask to see this. And be ready for follow-on data rights activity - for example, you may receive more subject access requests; make sure you understand your SAR deadlines and process.
How To Reduce The Damage And Manage Legal Risk
After containment and assessment, focus on steps that lower harm and demonstrate accountability under UK GDPR’s “integrity and confidentiality” and “accountability” principles.
Containment Best Practices
- Reach out by phone as well as email to the unintended recipient for a faster response.
- Where appropriate, ask the recipient to sign a short acknowledgement confirming deletion and non-use - especially if they are a business contact.
- If a processor (for example, your IT or communications provider) was involved, make sure they’ve triggered their own incident process and given you the required information under your Data Processing Agreement.
- If the information concerns staff, align your approach with your employment confidentiality policies and take advice before contacting employees or unions.
Communications And Evidence
- Prepare a clear, factual internal summary for senior management and your board (if applicable).
- Keep a timeline of decisions and actions. This helps if the ICO requests details or if customers ask questions later.
- For customer-facing communications, keep the tone empathetic and practical. Avoid over-sharing technical details that could create security risks.
Security Improvements You Can Implement Quickly
- Switch on an “undo send” delay (for example, 30 seconds) and set outbound delay rules for certain teams.
- Reduce auto-complete risks by limiting “suggested recipients” and promoting address book hygiene.
- Use password-protected attachments and share passwords via a separate channel (not in the same email).
- For regular exchanges of sensitive documents, move away from email to a secure portal or managed file transfer tool.
- Review BYOD and mobile risks - unmanaged personal devices often increase exposure, so ensure you have appropriate controls in place. It’s worth revisiting the pitfalls in work phones vs BYOD.
Preventing Future Email Mishaps: Practical Controls For SMEs
Email misdirection is one of the most common causes of data incidents. The good news is that a combination of people, process, and technology controls can significantly reduce the risk.
People: Train For Precision
- Run regular, short training on email hygiene: double-check recipients, beware of similarly named contacts, use “bcc” for bulk sends, and avoid including personal data where not strictly necessary.
- Make “second pair of eyes” mandatory for high-risk or bulk communications.
- Reinforce confidentiality responsibilities in onboarding and your staff handbook. If you have questions about internal obligations and incident handling, our guide to confidentiality breaches at work sets out practical employer steps.
Process: Build A Safer Default
- Adopt a “data minimisation” mindset - only email the personal data that’s necessary for the purpose.
- Use standard templates with pre-inserted privacy messaging and instructions where you regularly send sensitive content.
- Introduce a simple escalation path - if someone makes a mistake, they know exactly who to tell and what to do in the first 10 minutes.
- Maintain an incident register and review it quarterly for patterns, then tweak processes accordingly.
Technology: Configure Helpful Guardrails
- Enable outbound data loss prevention (DLP) alerts for sensitive keywords or file types (for example, “NI number”, “passport”).
- Switch on banner warnings for external emails (“You are emailing outside the organisation”).
- Use encryption and secure links rather than attachments where you can revoke access.
- Harden your collaboration stack - if you use cloud storage to share files, make sure sharing settings align with UK GDPR. If your team stores or shares files online, consider whether your setup is suitable given topics like Google Drive and GDPR.
What Legal Documents And Policies Should You Have In Place?
Getting your legal foundations right makes incidents easier to handle and reduces risk. As a minimum, consider the following:
- Privacy Policy – Tell customers what personal data you collect, why, and how you’ll protect it. Ensure your external privacy notice matches reality and UK GDPR requirements. If you need one tailored to your business, a professionally drafted Privacy Policy is a smart starting point.
- Data Breach Response Plan – A playbook that clearly sets out roles, escalation steps, decision criteria, and notification templates for the first 72 hours. Put a practical Data Breach Response Plan in place so you’re prepared.
- Data Processing Agreement (DPA) – If suppliers process personal data for you (email platforms, IT support, cloud storage), you must have a compliant Data Processing Agreement that includes incident reporting timelines and assistance obligations.
- Confidentiality Clauses In Employment Contracts – Ensure every employee’s contract includes clear duties to protect business and personal data. Strong confidentiality obligations in each Employment Contract help you manage and enforce standards internally.
- Non-Disclosure Agreements (NDAs) – When sharing sensitive information with partners, freelancers or prospective clients, use a robust Non-Disclosure Agreement to restrict use and control onward disclosures.
- Acceptable Use, BYOD, And Remote Work Policies – Define how staff can use email, devices, and collaboration tools, and what’s prohibited. This supports training and enforcement and reduces the risks tied to personal devices and remote work.
It can feel like a lot, but these documents work together: your policies guide behaviour; your contracts set clear obligations; your incident plan helps you move fast and stay compliant when something goes wrong. Getting them tailored to how your business actually operates will protect you as you grow.
Key Takeaways
- Misdirected emails can be a personal data breach under UK GDPR or a serious confidentiality issue - act fast to contain, assess, and document.
- Within the first hour, notify your data protection lead, attempt recall/containment, contact the unintended recipient, and start a risk assessment.
- Report to the ICO within 72 hours if the breach is likely to result in a risk to people’s rights and freedoms; tell affected individuals without undue delay if the risk is high.
- Record everything in your breach register, including decisions, risk reasoning, and evidence of containment efforts.
- Reduce future risk with simple controls: email delay rules, two-person checks for bulk sends, DLP alerts, encryption, and targeted training.
- Put the right legal foundations in place - a clear Privacy Policy, a practical Data Breach Response Plan, strong confidentiality in Employment Contracts, NDAs with third parties, and compliant DPAs with your processors.
- Expect follow-on data rights requests after an incident and make sure your team can meet SAR timelines and handle complaints efficiently.
If you’d like tailored help to manage a misdirected email incident or to put strong protections in place, you can reach us at 08081347754 or team@sprintlaw.co.uk for a free, no-obligations chat.


