Alex is Sprintlaw’s co-founder and principal lawyer. Alex previously worked at a top-tier firm as a lawyer specialising in technology and media contracts, and founded a digital agency which he sold in 2015.
If you run a small business, it’s easy to assume “data protection” is mainly a big-company problem.
But in reality, data protection breaches often happen in everyday situations: a staff member emails the wrong attachment, a laptop goes missing, customer details sit in an unsecured spreadsheet, or someone installs “helpful” software that quietly collects more data than it should.
When something like that happens, the big question is: does this count as a breach of the DPA, and what do we need to do next?
This guide breaks down what a breach of the DPA can look like for UK businesses, the risks you need to be aware of, and a practical action plan to follow if you suspect something has gone wrong.
What Does “Breach Of DPA” Mean For A UK Business?
In the UK, “DPA” usually refers to the Data Protection Act 2018, which sits alongside the UK GDPR. Together, they set out rules for how businesses must handle personal data (information that identifies someone, directly or indirectly).
So, what does a breach of the DPA look like in practical terms?
For most businesses, it comes down to two common situations:
1) A “Personal Data Breach” (Security Incident)
A personal data breach is a security incident that leads to:
- accidental or unlawful destruction of personal data (eg losing a database with no backup)
- loss of personal data (eg a stolen device with customer records)
- alteration of personal data (eg records corrupted by malware)
- unauthorised disclosure (eg emailing payroll info to the wrong person)
- unauthorised access (eg a hacked account or an internal “snooping” incident)
This is the scenario most people mean when they talk about a DPA breach.
2) A Wider Compliance Breach (Not Just Security)
Sometimes the “breach” isn’t a hack or lost laptop. It’s that your business has handled data in a way that doesn’t comply with the rules. For example:
- collecting more personal data than you actually need
- keeping personal data for longer than necessary
- not being transparent about what you do with data
- using personal data for a new purpose without a proper legal basis
- failing to respond properly to data rights requests
These issues can still create serious risk for your business (especially if a complaint is made), even if no one has “broken into” your systems.
Why This Matters Even If You’re A Small Business
UK data protection law doesn’t only apply to tech companies or major retailers. If your business has any of the following, data protection is already part of your day-to-day operations:
- a customer list or CRM
- an email marketing list
- staff HR files (even for one employee)
- CCTV footage
- online bookings, enquiries, or contact forms
- payment records, invoices, or delivery details
In other words: if you do business, you handle personal data.
Common Examples Of A Breach Of DPA In Small Businesses
When you think “data breach”, it’s natural to picture a sophisticated cyberattack. But a breach of the DPA often happens through simple mistakes, rushed admin, or unclear internal processes.
Here are some common examples we see in small and growing businesses:
Email And Document Mistakes
- sending personal data to the wrong recipient (eg attaching the wrong file)
- using CC instead of BCC for group emails (exposing email addresses)
- sharing a link to a document with “anyone with the link can view” enabled
Lost Devices And Poor Access Control
- a lost phone/laptop without encryption or a passcode
- shared logins for staff, so you can’t track who accessed what
- ex-employees still having access to accounts or cloud folders
Staff “Snooping” Or Unauthorised Access
Sometimes the incident is internal: a team member accesses customer or employee information they don’t need for their job. This can become particularly sensitive if it involves HR, health data, or disciplinary records.
If your business uses workplace monitoring tools, make sure you’re handling them carefully, with proper transparency and safeguards in place (including policies and access limits). Issues can arise quickly if you monitor employees' computers without a clear lawful basis and proper internal documentation.
CCTV, Audio, And Recording Risks
CCTV can be a legitimate security tool, but it can also create privacy risk if you collect more information than you need (especially audio).
For example, installing audio recording in public-facing areas (or staff areas) can raise significant compliance issues. If you use surveillance tech, it’s worth understanding the added risks of CCTV with audio and whether you can record conversations lawfully in a business context.
Marketing And Consent Problems
- adding people to marketing lists without a proper basis (for example, consent where required under PECR)
- not giving customers a clear way to unsubscribe
- reusing old contact lists without checking what users agreed to, and whether PECR rules apply
Even if there’s no “breach” in the security sense, using personal data in a non-compliant way can still trigger complaints and enforcement.
What Are The Risks If You Have A Breach Of DPA?
Once you suspect a breach of the DPA (or UK GDPR), it’s important to think about risk in a structured way.
The impact can fall into a few categories:
1) Regulatory Risk (Including ICO Action)
The Information Commissioner’s Office (ICO) regulates data protection in the UK. Depending on the seriousness of the breach, the ICO can:
- investigate your business
- require you to change your practices
- issue warnings or enforcement notices
- in more serious cases, issue administrative fines
Not every incident leads to enforcement. But the way you respond matters a lot. Businesses that act quickly, document decisions, and take practical steps to reduce harm are generally in a stronger position than businesses that delay, deny, or fail to keep records.
2) Claims And Complaints From Individuals
If individuals are affected, they may complain to the ICO and/or make a claim if they believe your handling of personal data caused them harm.
This could involve financial loss (eg fraud risk) or distress (particularly where sensitive information is involved).
3) Commercial And Reputation Damage
For small businesses, reputational damage can hit harder than a formal fine.
Even a “minor” incident can lead to:
- lost customer confidence
- clients pausing contracts (especially B2B customers)
- time-intensive admin responding to questions and requests
- team disruption and loss of focus on operations
4) Contractual Risk
If you provide services to other businesses, your contracts may require you to notify them of data incidents within a set timeframe (sometimes very quickly). If you miss that window, you may be in breach of contract as well as facing a data protection issue.
This is one reason it’s helpful to have clear internal processes for incidents, so you’re not scrambling when time is tight.
What Should You Do Next If You Suspect A Breach Of DPA?
If you suspect a breach of the DPA, don’t panic - but do act quickly.
Here’s a practical response plan that works well for most small businesses (and can be tailored depending on what happened).
Step 1: Contain The Incident
Your first priority is stopping the breach from continuing. Depending on the situation, that might mean:
- resetting passwords and enabling multi-factor authentication
- revoking access to shared folders or accounts
- recovering or remotely wiping a lost device
- asking an unintended email recipient to delete the message/attachment (and confirming they’ve done so)
- isolating infected systems if malware is involved
The key is to minimise further access, disclosure, or loss.
Step 2: Assess What Data Was Involved
You’ll want to gather facts quickly and calmly. For example:
- what personal data was affected (names, addresses, emails, payment info, health info, etc.)?
- how many individuals were affected?
- was the data encrypted or protected?
- who had access (a random third party, a known recipient, a staff member without authorisation)?
- is the breach ongoing or contained?
This step is crucial because it helps you work out how serious the risk is, and what notifications might be required.
Step 3: Record Everything (Even If You Don’t Report It)
Even if you decide a breach doesn’t need to be reported, you should still keep a clear internal record of:
- what happened
- when it happened and when you found out
- what data was involved
- what containment steps you took
- your reasoning for reporting (or not reporting)
- what improvements you’ll make to prevent recurrence
This record can be invaluable later if a complaint is made, or if questions come up from customers, insurers, or business partners.
Many businesses find it helpful to formalise this using a documented data breach response plan, so the steps and responsibilities are clear from day one.
Step 4: Decide Whether You Need To Notify The ICO
Under UK GDPR, you may need to notify the ICO if the breach is likely to result in a risk to individuals’ rights and freedoms.
In general terms, reporting is more likely to be required where:
- sensitive data is involved (eg health information)
- financial details could be misused
- identity theft or fraud is a realistic risk
- a large number of people are affected
- the data is publicly exposed (eg online)
Timing matters too. If a report is required, it’s usually expected within 72 hours of you becoming aware of the breach. That doesn’t mean you need every detail within 72 hours - but you should be moving quickly, documenting what you know, and updating as needed.
Whether reporting is necessary can be a judgment call, and it’s often worth getting legal advice if the incident is borderline or involves sensitive data.
Step 5: Decide Whether You Need To Tell The Affected Individuals
In some cases, you may also need to inform the affected individuals directly, particularly if the breach is likely to result in a high risk to them.
If you do notify people, your message should be clear and practical, including:
- what happened (in plain English)
- what information was involved
- what you’ve done to contain it
- what they can do to protect themselves
- how they can contact you
Getting the wording right matters. You want to be transparent without guessing facts or creating confusion. A careful, accurate notification can reduce reputational harm and show you’re taking the issue seriously.
Step 6: Prepare For Follow-Up Requests
After a data incident, it’s common to receive follow-up requests such as:
- questions about what data you hold
- requests to delete information
- access requests for copies of personal data
This is where having a process for handling a Subject Access Request can save you a lot of time (and reduce the chance of a second compliance issue while you’re already under pressure).
How Can You Reduce The Risk Of A Breach Of DPA Happening Again?
Once the urgent situation is under control, the next step is making sure your business is better protected going forward.
For most small businesses, the goal isn’t perfection - it’s having clear, sensible safeguards that match your size, the type of data you hold, and the real-world risks you face.
Put Strong “Legal Foundations” In Place
Good compliance is a mix of legal documents, internal processes, and practical security steps.
Start with the basics:
- Know what personal data you collect (customers, staff, suppliers) and why you collect it
- Limit access so staff only see what they need for their role
- Set retention periods so you don’t keep personal data “just in case”
- Train your team on the most common risks (emailing mistakes are a big one)
Have A Clear Privacy Policy (And Make It Match Reality)
A well-drafted Privacy Policy helps you explain (clearly and lawfully) what you do with personal data, why you do it, and what rights individuals have.
But it’s not just a website tick-box. Your privacy information should match what your business actually does day-to-day - especially if you use booking systems, analytics tools, marketing platforms, or outsourced service providers.
Check Your Tech, Systems, And Suppliers
Many DPA issues come from suppliers and software tools, not “your” systems directly. It’s worth checking:
- who hosts your data (cloud platforms, practice management tools, CRMs)
- what security features are enabled (2FA, encryption, access logs)
- whether you have appropriate contractual protections in place
- what happens if the supplier has an incident
If you want a more structured approach (and you’re not sure where your gaps are), a tailored compliance setup can be a practical investment, especially as you grow. Many businesses choose a packaged approach like a GDPR package so their documentation and processes are aligned.
Document Your Incident Process Before You Need It
It’s much harder to respond well to a breach when you’re making up the process in real time.
Even a simple plan can help you move quickly, assign responsibilities, and document decisions properly. If you haven’t already, putting a written data breach response plan in place is one of the most effective “next steps” after an incident.
Key Takeaways
- A breach of the DPA often refers to a personal data breach (loss, unauthorised access, or disclosure), but it can also involve wider compliance failures under the Data Protection Act 2018 and UK GDPR.
- Small businesses are commonly caught out by everyday issues like misdirected emails, poor access control, unsecured shared folders, and unclear internal processes.
- If you suspect a breach, focus first on containment, then assess what data was involved and document your decision-making from the start.
- You may need to notify the ICO (and sometimes affected individuals) depending on the level of risk to people’s rights and freedoms - timing is critical, and legal advice can help for borderline cases.
- After the incident, reduce future risk by tightening access controls, training staff, checking suppliers, and making sure your privacy documentation and processes reflect what your business actually does.
If you’d like help responding to a breach of the DPA or putting the right privacy documents and processes in place, you can reach us at 08081347754 or team@sprintlaw.co.uk for a free, no-obligations chat.


