Alex is Sprintlaw’s co-founder and principal lawyer. Alex previously worked at a top-tier firm as a lawyer specialising in technology and media contracts, and founded a digital agency which he sold in 2015.
- What Counts As “Invasion Of Privacy” For A UK Business?
Invasion Of Privacy Examples You Might Be Overlooking
- 1) CCTV And Audio Recording In Customer Areas
- 2) Employee Monitoring That Goes Too Far
- 3) Biometric Clocking‑In (Fingerprint/Face Scans)
- 4) Sharing Screenshots Of Private Messages
- 5) Posting Customer Photos Or Testimonials Without Clear Permission
- 6) Hidden Online Tracking And Non‑Compliant Cookie Banners
- 7) Emailing All Staff About Someone’s Illness Or Disciplinary Issue
- 8) Call Recording Without Adequate Notice
- 9) Facial Recognition For Shoplifting Prevention
- 10) Using Personal Data For A New Purpose Without Telling People
- What Laws Should UK Businesses Think About?
How To Stay Compliant: Practical Steps For Small Businesses
- 1) Be Clear About Your Purposes And Lawful Bases
- 2) Put Your Transparency In Writing
- 3) Limit What You Collect And How Long You Keep It
- 4) Carry Out DPIAs For Anything High Risk
- 5) Lock Down Vendors And Data Sharing
- 6) Get Your Cookie Controls Right
- 7) Train Your Team And Set Boundaries
- 8) Prepare For Requests And Complaints
- What Legal Documents Help Prevent Privacy Issues?
- Handling Complaints, Incidents And Investigations
- Key Takeaways
Privacy risks aren’t just a “big tech” problem. Everyday decisions in small businesses - from how you use CCTV to what you post on your social media - can tip into an invasion of privacy if you’re not careful.
In the UK, “invasion of privacy” isn’t a single, catch‑all law, but a mix of rules you need to get right. These include UK GDPR and the Data Protection Act 2018 (for personal data), the common law tort of misuse of private information, breach of confidence, and sector‑specific rules like PECR (cookies and electronic marketing). If you gather, use or disclose information about people, the way you handle it really matters.
In this guide, we’ll run through the most common invasion of privacy examples we see from a business perspective, the laws in play, and the simple steps you can take to stay compliant and protect your brand.
What Counts As “Invasion Of Privacy” For A UK Business?
There isn’t a single legal definition, but businesses can land in trouble when they:
- Collect, use or share personal data without a lawful basis or transparency (breaching UK GDPR/DP Act 2018).
- Intrude on someone’s private life in a way a reasonable person would find objectionable (e.g. excessive surveillance in a private space).
- Disclose private information (like health details or personal messages) without consent or another legal basis (misuse of private information/breach of confidence).
- Track or profile people online without giving proper notice or choice (typically a PECR/cookies issue).
From a risk perspective, look for situations where your business learns something about a person that they reasonably expect to keep private, or where your technology monitors, records or tracks people without clear justification, notice and controls.
Invasion Of Privacy Examples You Might Be Overlooking
Below are real‑world scenarios that trip up small businesses. We’ve framed each example with the legal hooks to watch.
1) CCTV And Audio Recording In Customer Areas
Installing CCTV can be a legitimate security measure, but it can also cross the line. Recording in areas where people expect privacy (e.g. staff break rooms or toilets) is almost always unlawful. Audio recording raises additional red flags because it’s far more intrusive than video alone and usually harder to justify under UK GDPR’s “necessity” test.
- Key risks: Excessive monitoring, lack of signage, audio capture by default, keeping footage longer than needed.
- Laws in play: UK GDPR and DP Act (lawful basis, transparency, minimisation, retention), PECR in some contexts, misuse of private information for egregious intrusions.
If you’re considering mics with your cameras, make sure your setup meets the higher bar for necessity and clearly warn people. For a deeper dive, have a look at CCTV with audio.
2) Employee Monitoring That Goes Too Far
It’s common to monitor company devices and networks, but blanket surveillance without clear notice and a legitimate aim is risky. Examples include keystroke logging, always‑on webcams, or tracking an employee’s browsing in a way that captures sensitive personal data.
- Key risks: Lack of transparency, disproportionate monitoring, capturing special category data (e.g. health, religion) via browsing history.
- Laws in play: UK GDPR/DP Act (including fairness and necessity), employment law duties, and potential Article 8 ECHR privacy considerations.
Provide clear notice, have a policy, and only monitor what you genuinely need. If you’re weighing what’s reasonable, start with whether you can achieve your aim with a lighter‑touch option. For context, this piece on when employers can monitor internet use explains the balancing act in plain English.
3) Biometric Clocking‑In (Fingerprint/Face Scans)
Biometrics can reduce buddy‑punching and speed up attendance logs - but they’re sensitive personal data, so you must treat them with extra care. Consent is rarely “freely given” in an employment context, so you’ll need a different lawful basis and a Schedule 1 condition under the DP Act. You also need strong security and a privacy impact assessment.
- Key risks: Relying on weak consent, not offering a reasonable alternative, keeping templates indefinitely, vendor risks.
- Laws in play: UK GDPR/DP Act (special category data rules), DPIA requirement for high‑risk processing.
If you’re exploring biometrics, this guide to biometric clocking systems covers the compliance checkpoints to build in from day one.
4) Sharing Screenshots Of Private Messages
Publishing customer or staff DMs, emails or Slack screenshots (even in marketing) can amount to misuse of private information or breach of confidence, and may also breach UK GDPR if the messages include personal data. Even if you “blur a name”, context often makes people identifiable.
- Key risks: No consent, context revealing identity, including sensitive data (health, sexual orientation, etc.).
- Laws in play: Misuse of private information, breach of confidence, UK GDPR/DP Act, defamation if content is inaccurate.
When in doubt, get written consent, minimise information, and consider whether the same point can be made without exposing anyone. This article on sharing private messages explains the legal risks and safer alternatives.
5) Posting Customer Photos Or Testimonials Without Clear Permission
It’s tempting to post a happy customer photo or glowing review. If a person is identifiable, you’re processing their personal data and need a lawful basis and fair notice. Using a photo from a private setting without consent is particularly risky from a privacy and IP perspective, and kids’ photos need extra caution.
- Key risks: No consent for marketing, facial images of children, implying an endorsement.
- Laws in play: UK GDPR/DP Act, passing off/ASA guidance (misleading endorsements), copyright if you reuse others’ images.
Cleanest approach: obtain express, documented permission, specify the channels you’ll use, and give an easy way to opt out later.
6) Hidden Online Tracking And Non‑Compliant Cookie Banners
Dropping non‑essential cookies (analytics, advertising, social media) without informed consent breaches PECR, and poor transparency breaches UK GDPR. Common pitfalls include pre‑ticked boxes, “accept all” with no equivalent “reject all”, or bundling multiple purposes into one vague consent.
- Key risks: Consent that isn’t freely given or granular, dark patterns, missing cookie policy/consent logs.
- Laws in play: PECR (cookies), UK GDPR transparency and consent standards.
Make sure your cookie banners let users reject as easily as accept and don’t set non‑essential cookies until consent is recorded.
7) Emailing All Staff About Someone’s Illness Or Disciplinary Issue
Disclosing an employee’s health information to colleagues is highly sensitive and should be strictly limited to a need‑to‑know basis. Likewise, sharing details of disciplinary investigations beyond those who need to be involved risks both privacy and employment claims.
- Key risks: Special category data disclosure, reputational harm, victimisation risks.
- Laws in play: UK GDPR/DP Act, employment law duties, misuse of private information.
Keep circulation tight, anonymise where possible, and use secure channels with access controls.
8) Call Recording Without Adequate Notice
Recording customer service calls can be lawful if you have a legitimate purpose and provide clear, upfront notice. Recording “just in case” - especially if the purpose isn’t specified or recordings are kept indefinitely - is unlikely to pass the necessity and fairness tests.
- Key risks: Hidden recording, retention without purpose, sharing calls for training without anonymising.
- Laws in play: UK GDPR (lawful basis, transparency, minimisation), PECR in some contexts.
Always tell callers you’re recording, why, and how long you’ll keep it - and give a route to proceed without recording where feasible.
9) Facial Recognition For Shoplifting Prevention
FR is a high‑risk technology. Even if your aim is legitimate, it involves processing biometric data on members of the public, which demands a compelling necessity case, robust DPIA, strong security, and clear signage. Many deployments won’t be justifiable for small retailers.
- Key risks: Special category data, false positives, lack of transparency, vendor risk.
- Laws in play: UK GDPR/DP Act (special category), proportionality, human rights considerations.
Proceed with extreme caution. This overview on facial recognition technology outlines when and how it might be used lawfully.
10) Using Personal Data For A New Purpose Without Telling People
Collecting customer emails for order confirmations and later using them for cross‑selling without clear consent is a classic privacy pitfall. UK GDPR restricts “purpose creep” - using data for a materially different purpose than the one you collected it for, unless you have a new lawful basis and you’ve updated your notices.
- Key risks: Unlawful direct marketing without consent, PECR breaches for electronic marketing.
- Laws in play: PECR (email/SMS marketing), UK GDPR (purpose limitation, transparency).
If in doubt, get fresh consent or use the soft opt‑in properly where it applies (recent sale, similar products, easy opt‑out at the point of collection and in every message).
What Laws Should UK Businesses Think About?
While the facts matter in each case, these are the core legal pillars behind most invasion of privacy disputes:
- UK GDPR and Data Protection Act 2018 - governs how you collect, use, store and share personal data. You need a lawful basis, transparency, minimisation, security and appropriate retention. Special category data (like biometrics and health) has additional rules.
- Privacy and Electronic Communications Regulations (PECR) - covers electronic marketing, cookies and similar tech, and some call tracking rules. Consent is the default for non‑essential cookies and certain types of marketing.
- Misuse of Private Information - a common law claim if you disclose or intrude upon genuinely private information where the person had a reasonable expectation of privacy.
- Breach of Confidence - if you disclose information that was imparted in confidence (for example, a staff member’s health note), you could face claims even if it’s not “personal data”.
- Employment Law - monitoring staff has to be proportionate and transparent, and you should align with your employment contracts and policies.
- Human Rights Act/Article 8 ECHR - the right to private and family life underpins how courts assess intrusions.
You don’t need to be a privacy lawyer to run a compliant business - but you do need to build these principles into your daily operations and documentation.
How To Stay Compliant: Practical Steps For Small Businesses
1) Be Clear About Your Purposes And Lawful Bases
Before you collect or record anything, write down what you’re trying to achieve and what lawful basis you’ll rely on (e.g. contract, legitimate interests, consent). If you can achieve your aim in a less intrusive way, do that.
2) Put Your Transparency In Writing
People need to know what data you collect, why, and for how long. Publish a clear, accessible Privacy Policy and use signage or just‑in‑time notices for things like CCTV, call recording and online tracking.
3) Limit What You Collect And How Long You Keep It
Only capture what you genuinely need (data minimisation), and set retention rules (e.g. CCTV for 30 days unless needed for an incident). Build deletion into your routine and document the logic.
4) Carry Out DPIAs For Anything High Risk
If you’re introducing surveillance, biometrics, large‑scale monitoring or new tracking tech, run a Data Protection Impact Assessment. This helps evidence your necessity assessment and the safeguards you’ve built in.
5) Lock Down Vendors And Data Sharing
If a third party processes data for you (e.g. your CCTV provider or CRM), you’re legally required to have a Data Processing Agreement in place. Make sure your processors provide appropriate security and don’t use sub‑processors without your approval.
6) Get Your Cookie Controls Right
Don’t drop analytics/ads cookies until consent is recorded, and allow users to reject as easily as accept. Keep a record of consents and provide a cookie preference centre that’s easy to revisit, consistent with the standards discussed under compliant cookie banners.
7) Train Your Team And Set Boundaries
Staff should know they can’t share screenshots containing personal data, announce colleagues’ medical updates, or export customer lists to personal devices. Policies and quick scenario training go a long way.
8) Prepare For Requests And Complaints
People can ask to access their data, object to processing, or ask you to delete it. Build a simple process to recognise and respond to requests on time, and be ready to pause non‑essential processing if someone raises an objection to direct marketing or intrusive profiling.
What Legal Documents Help Prevent Privacy Issues?
Having the right paperwork makes compliance easier and reduces the risk of claims. At a minimum, consider:
- Privacy Policy - tell people how you use their data across touchpoints. If you operate online, this should cover cookies, analytics and marketing. A well‑drafted Privacy Policy is foundational.
- CCTV Notices And Internal SOPs - signage for the public and internal rules covering camera placement, audio, access and retention.
- Employee Monitoring Policy - make expectations clear and set limits that align with UK GDPR principles.
- Data Processing Agreement - with all vendors who process data for you, from cloud CRMs to CCTV service companies. Use a robust Data Processing Agreement that covers security, sub‑processing and audit rights.
- Cookie Controls And Policy - consent mechanisms, a cookie list and an easy way for users to change their choices.
- Marketing Permissions Language - build compliant consent and opt‑outs into your email capture and SMS workflows.
- Incident Response Plan - so you can act fast if there’s a data breach or a wrongful disclosure.
If you use biometric systems, add a specific policy and offer a reasonable alternative (e.g. a key card) for staff who can’t or don’t want to use biometrics, echoing the guidance for biometric clocking systems.
Handling Complaints, Incidents And Investigations
Even with good controls, mistakes can happen. A quick, well‑documented response often prevents a small issue from turning into a major dispute.
- Log the incident - what happened, who’s affected, and what personal data is involved.
- Contain and remediate - stop the processing that caused the issue, fix settings, and secure any exposed data.
- Assess breach notification duties - if the breach risks people’s rights and freedoms, you may need to notify the ICO within 72 hours and, in serious cases, the affected individuals.
- Communicate appropriately - be transparent without oversharing; avoid compounding the issue by disclosing additional private details.
- Review and improve - update policies, training and vendor controls based on what you’ve learned.
If a complaint involves publishing or forwarding private correspondence, pause further disclosure immediately and take advice. The law around sharing private messages is stricter than many people expect.
Key Takeaways
- “Invasion of privacy” issues for businesses most often arise from surveillance, employee monitoring, online tracking, and disclosing private communications or health details without a proper legal basis.
- UK GDPR/DP Act, PECR, misuse of private information and breach of confidence are the main legal frameworks - get the lawful basis, transparency and proportionality right.
- High‑risk areas like audio capture with CCTV and biometrics require stronger justification, clear signage, short retention, and robust vendor controls.
- Publish a clear Privacy Policy, implement compliant cookie controls, and lock down processors with a strong Data Processing Agreement.
- Train your team not to share private messages or health information, and set policies to govern monitoring, social media, CCTV and incident response.
- If you’re unsure whether your monitoring or marketing plan is proportionate, take advice early - a quick check can save costly complaints and regulatory attention.
If you’d like help assessing privacy risks, drafting your policies or reviewing surveillance/marketing plans, you can reach us at 08081347754 or team@sprintlaw.co.uk for a free, no‑obligations chat.


