Alex is Sprintlaw’s co-founder and principal lawyer. Alex previously worked at a top-tier firm as a lawyer specialising in technology and media contracts, and founded a digital agency which he sold in 2015.
If you run a small business, confidentiality isn’t just a “nice to have” - it’s often the thing that protects your competitive edge, your customer trust, and even your legal compliance.
So when confidential information gets leaked (whether by an employee, contractor, supplier, or even accidentally), it can feel like the ground shifts under your feet. The good news is: with the right approach, you can contain the damage, protect your position, and put stronger safeguards in place for next time.
This guide walks you through how to deal with a breach of confidentiality from a UK small business perspective - including practical steps, key legal considerations, and the documents that help you stay protected from day one.
What Counts As A Breach Of Confidentiality In A Small Business?
Before you decide what to do, you need to be clear on what actually happened. Not every “leak” is legally a breach of confidentiality - and not every confidential issue is best handled with lawyers on day one.
Common Examples Of Confidential Information
In a business context, “confidential information” often includes:
- Customer data (names, contact details, purchase history, payment-related information)
- Pricing, margins, or supplier terms
- Business plans and financials (forecasts, investor decks)
- Trade secrets (formulas, processes, internal know-how)
- Product or launch plans (roadmaps, designs, prototypes)
- Internal documents (policies, disciplinary records, strategy documents)
- Source code and technical documentation (for software and tech businesses)
Confidentiality issues can also pop up around communications - for example, if someone shares private Slack messages, emails, or screenshots. If that’s your situation, it’s worth being aware of the private message sharing risks that can affect both employment and privacy obligations.
How Confidentiality Obligations Usually Arise
A confidentiality obligation typically comes from one (or more) of these sources:
- An employment relationship (confidentiality is often an express term and/or an implied duty)
- A written contract (employment contract, contractor agreement, supplier agreement, service agreement)
- A non-disclosure agreement (NDA) signed before sharing information
- Equitable “breach of confidence” principles (even if there’s no contract, UK law can protect confidential information in certain circumstances)
- Data protection law where personal data is involved (UK GDPR and the Data Protection Act 2018)
If you regularly share sensitive information with staff, contractors, or third parties, it’s usually worth having a properly drafted Non-Disclosure Agreement for higher-risk situations (like product development, partnerships, or investor discussions).
How To Deal With A Breach Of Confidentiality: First Response Steps (Your “Day One” Checklist)
When a breach happens, your first 24–72 hours matter. Acting quickly can reduce harm and preserve evidence - without making the situation worse by overreacting.
1. Contain The Leak (Without Destroying Evidence)
Your immediate goal is to stop further disclosure. Practical steps might include:
- Restricting access to relevant folders, systems, or tools
- Changing passwords and revoking logins (especially for leavers)
- Disabling forwarding rules, external sharing links, or compromised accounts
- Asking the recipient of leaked information to delete/return it (politely but firmly)
Be careful not to delete accounts, wipe devices, or “clean up” files too early - that can accidentally destroy evidence you may need later.
2. Identify Exactly What Information Was Disclosed
Try to capture a clear summary:
- What was disclosed (documents, screenshots, database exports, client lists, etc.)
- When it happened (timeline)
- Who disclosed it and who received it
- How it happened (email, WhatsApp, cloud link, USB, printed documents)
- Where the information is now (online post, competitor inbox, personal device)
This becomes the backbone of your investigation and (if needed) any legal action.
3. Preserve Evidence Properly
In many confidentiality disputes, the business that keeps clean records is in the strongest position.
- Save copies of emails, messages, access logs, and relevant documents
- Record who has handled evidence and when
- Take screenshots (with timestamps where possible)
- Keep a written incident log (actions taken, by whom, and why)
If you have workplace policies that cover device usage and data handling, follow them consistently. If you don’t, it may be time to implement a clearer Acceptable Use Policy so expectations (and consequences) aren’t ambiguous.
4. Consider Whether Personal Data Is Involved (UK GDPR)
If the leaked information includes personal data (customer details, staff records, contact lists linked to individuals), you may also be dealing with a personal data breach.
That can trigger UK GDPR obligations such as:
- assessing the risk to individuals’ rights and freedoms
- considering whether you need to report to the ICO (Information Commissioner’s Office) (and if so, doing so without undue delay and, where feasible, within 72 hours of becoming aware)
- considering whether affected individuals must be notified (where the breach is likely to result in a high risk)
- documenting the breach and your response
Even if you ultimately decide reporting isn’t required, you should still document the decision-making. Many businesses use a structured Data Breach Response Plan so these steps don’t get missed when you’re under pressure.
How To Investigate A Breach Fairly (And Why It Matters)
Once the situation is contained, the next step is working out what actually happened and what you can prove.
If the suspected person is an employee, you also need to keep the process fair and consistent - not just to “do the right thing”, but because an unfair process can create additional legal risk (for example, disputes about disciplinary action or dismissal).
Decide Whether This Is Misconduct, Gross Misconduct, Or A Mistake
A breach of confidentiality might be:
- Accidental (sent to the wrong email address, attached the wrong file)
- Careless (using personal email, weak passwords, sharing logins)
- Deliberate (taking customer lists, sending pricing to a competitor, posting internal info online)
This distinction matters because it affects:
- your disciplinary process
- the strength of any legal claim
- the remedies you should pursue (education vs enforcement)
Check The Contractual Position
Before you take action, gather the documents that define confidentiality in your business, such as:
- the person’s Employment Contract (or contractor agreement)
- any NDAs or specific confidentiality agreements
- your internal policies (confidentiality policy, acceptable use policy, data handling processes)
If you don’t have a clear, written confidentiality framework, you may still have legal options - but enforcement can be more complicated, slower, and more expensive than it needs to be.
Run A Structured Fact-Find
Your fact-find should aim to answer:
- Was the information actually confidential (or already public/common knowledge)?
- Was it clearly marked or treated as confidential internally?
- Did the person have permission or a legitimate reason to share it?
- What harm has occurred (or is likely to occur)?
- Is there ongoing risk (e.g. further leaks, competitor use)?
If the matter involves employees, it’s also worth checking that your internal rules are clear and up to date, including Workplace Confidentiality Policies that set expectations around handling sensitive information.
Your Legal Options If Confidential Information Has Been Disclosed
When you’re thinking about how to deal with a breach of confidentiality, it helps to remember that “legal options” isn’t one single path. In practice, you choose a response that matches the risk, the evidence, and your commercial goals.
1. Internal Action (Disciplinary Process Or Contract Management)
If the breach was caused by a staff member, your options may include:
- additional training and a documented warning (for minor/careless breaches)
- removing access privileges or changing responsibilities
- formal disciplinary action (including dismissal in serious cases, if appropriate)
Whether dismissal is on the table depends on your contracts, the seriousness of the breach, the employee’s role, and whether a fair process is followed.
2. A Written Demand To Stop Using/Sharing The Information
In many cases, the fastest and most cost-effective step is a formal letter (often drafted by a solicitor) requiring the person or recipient to:
- stop using and disclosing the confidential information
- confirm deletion/return of all copies
- identify who else received it
- preserve devices and records
- confirm undertakings going forward
This is particularly relevant if the information has gone to a competitor, a former contractor, or a third party who may not understand (or may ignore) the seriousness of the issue without a formal notice.
3. Injunctions (To Prevent Further Disclosure)
If you have strong evidence and there’s a real risk of immediate or ongoing harm, you may be able to apply to the court for an injunction to stop someone using or sharing the information.
Injunctions can be powerful - but they can also be time-sensitive and expensive. You’ll usually need to show things like:
- the information is confidential
- there’s been (or will be) unauthorised use/disclosure
- damages alone won’t be an adequate remedy
- the balance of convenience favours granting the injunction
This is a situation where getting early advice is crucial, because delays can weaken your argument that urgent court intervention is needed.
4. A Claim For Breach Of Contract Or Breach Of Confidence
If confidentiality obligations are in the contract (like an NDA or employment/contractor terms), you may be able to bring a claim for breach of contract.
Even without an express confidentiality clause, UK law can protect confidential information under “breach of confidence” principles where the information:
- has the necessary quality of confidence
- was shared in circumstances importing an obligation of confidence
- was misused to your detriment
Claims can seek remedies such as damages (compensation) or orders requiring information to be returned or not used.
5. Data Protection Steps (If Personal Data Was Involved)
If the disclosure involves personal data, you may need to take additional steps under UK GDPR and the Data Protection Act 2018, including breach reporting and communications. This is one of the reasons it’s so important to treat confidentiality and privacy as connected issues, not separate checklists.
Depending on what happened, you may also need to review your privacy compliance documents and internal processes, such as your broader GDPR Package approach (policies, training, and procedures), especially if the breach exposed a systemic weakness.
How To Prevent Confidentiality Breaches In The Future (Without Overcomplicating Things)
Once you’ve stabilised the immediate situation, it’s worth doing a short “lessons learned” review. This isn’t about blaming people - it’s about making sure the same breach doesn’t happen again in six months.
Put The Right Documents In Place
Most confidentiality problems are harder to deal with when obligations are vague, undocumented, or inconsistent.
Depending on your business, consider strengthening:
- your employment contracts (especially confidentiality, IP, and post-termination obligations)
- contractor agreements (including restrictions around client approaches and use of business materials)
- NDAs for high-risk discussions
- clear policies on device use, password rules, sharing tools, and remote working
If your breach involved a workplace situation, it can also help to understand the broader confidentiality breach consequences so you can set internal expectations at the right level.
Limit Access On A “Need To Know” Basis
A simple operational fix that makes a big legal difference: only give people access to what they genuinely need.
- Use role-based permissions
- Separate customer lists from general shared drives
- Restrict access to pricing, payroll, and strategy documents
- Remove access immediately when someone leaves (or changes roles)
This also helps you later if you need to prove the information was treated as confidential.
Train Your Team (And Make It Practical)
Policies don’t help if they’re unreadable or ignored. A short training session can cover:
- what your business treats as confidential
- how to share information securely
- common “accidental breach” scenarios (wrong recipient, public Wi-Fi, personal devices)
- who to report concerns to immediately
Training is also a good moment to make it clear that confidentiality obligations continue after employment ends - a point many people genuinely don’t understand unless you spell it out.
Have A Response Plan Before You Need One
If you’re ever dealing with a leak at 6pm on a Friday, you’ll be glad you have a process already mapped out.
Your plan might include:
- who internally leads the response
- how to preserve evidence
- how you assess whether personal data is involved
- template steps for securing accounts and access
- when you escalate to legal advice
This is exactly the kind of situation where a documented data and confidentiality response process can save you time, money, and stress.
Key Takeaways
- If you’re working out how to deal with a breach of confidentiality, start by containing the leak, preserving evidence, and clarifying exactly what information was disclosed and to whom.
- Check whether the breach involves personal data - if it does, UK GDPR and the Data Protection Act 2018 may require extra steps, including considering ICO reporting (and the 72-hour timeframe where feasible).
- Run a fair and structured investigation, particularly where an employee is involved, and document your timeline and decisions carefully.
- Your legal options may include internal action, a written demand for deletion/return, injunctive relief to stop further disclosure, and claims for breach of contract or breach of confidence.
- Prevention is usually cheaper than enforcement - strong contracts, NDAs, clear policies, and practical staff training help protect your business from day one.
If you’d like help dealing with a breach of confidentiality or putting the right confidentiality protections in place, you can reach us at 08081347754 or team@sprintlaw.co.uk for a free, no-obligations chat.


