Alex is Sprintlaw’s co-founder and principal lawyer. Alex previously worked at a top-tier firm as a lawyer specialising in technology and media contracts, and founded a digital agency which he sold in 2015.
- What Counts As An “Invasion Of Privacy” Under UK Law?
- Common Business Scenarios That Create Privacy Risk
How To Reduce The Risk Of An Invasion Of Privacy Claim
- 1) Map What You Collect And Why
- 2) Pressure‑Test Your Lawful Bases
- 3) Be Transparent With Clear Notices
- 4) Keep Monitoring Proportionate
- 5) Sort Out Cookies And Marketing
- 6) Put The Right Contracts In Place
- 7) Train Your Team
- 8) Prepare For Requests And Breaches
- 9) Review Tools And Tech
- 10) Document Your Decisions
- What To Do If Someone Alleges You Invaded Their Privacy
- Essential Documents And Policies To Have In Place
- Key Takeaways
“Invasion of privacy” is a phrase that can make any business owner nervous - and for good reason. Between CCTV, staff monitoring, cookies on your website and day‑to‑day handling of personal data, it’s easy to cross a line without meaning to.
The good news? With clear policies, the right documents and some simple habits, you can reduce the risk of complaints, claims and fines - and build trust with your customers and team from day one.
In this guide, we’ll unpack what “invasion of privacy” looks like under UK law, the common risk areas for small businesses, and the practical steps you can take now to stay compliant and protected.
What Counts As An “Invasion Of Privacy” Under UK Law?
There isn’t a single, standalone “tort of privacy” in the UK for businesses to tick off. Instead, privacy risks sit across a few legal areas. The most common routes for complaints or claims include:
- Data protection law (UK GDPR and the Data Protection Act 2018): If you collect, use, store or share personal data without a lawful basis, without transparency, or without adequate security, you can face regulatory action and compensation claims.
- Misuse of Private Information (MPI): A civil claim where an individual argues they had a reasonable expectation of privacy, and your disclosure or use of information was unjustified.
- Breach of confidentiality: If confidential information (for example, customer lists or an employee’s medical details) is disclosed in breach of a duty of confidence, that can lead to legal action.
- Harassment and surveillance offences: Aggressive or persistent monitoring could stray into harassment under the Protection from Harassment Act 1997. Intercepting communications without authority can also raise criminal issues.
- Computer misuse and monitoring: Accessing systems or messages without authorisation can engage the Computer Misuse Act 1990 and other criminal regimes.
From a business perspective, most “invasion of privacy” disputes are either about unlawful or excessive data collection/monitoring, or unfair disclosure of information. If you’re clear about why you’re collecting data, keep it to what’s necessary, and communicate openly, you’ve already reduced a big chunk of your risk.
Common Business Scenarios That Create Privacy Risk
Here are real‑world scenarios we see small businesses trip over. If any of these sound familiar, it’s a sign to tighten up your approach.
- CCTV with audio recording: Using microphones alongside cameras can be highly intrusive unless you can show it’s necessary and proportionate, with clear notices and controls. For more on this specific risk, see our guidance on CCTV with audio.
- Workplace cameras: Filming staff areas like break rooms or monitoring staff without good reason can breach data protection and employment rights. Start by reviewing whether monitoring is genuinely needed and signposted - our explainer on cameras in the workplace covers key rules.
- Internet and device monitoring: Tracking browsing history, keystrokes or location data can be lawful in limited, clearly communicated scenarios. You’ll need a legitimate aim, policies and safeguards - our guide on monitoring internet use at work outlines the boundaries.
- Collecting customer data “just in case”: Asking for dates of birth, phone numbers or ID when it isn’t necessary, or keeping data indefinitely, will likely breach data minimisation and retention principles.
- Call recordings: Recording calls without a lawful basis, clear notices and a genuine need can cause complaints (and you’ll need to handle access requests to recordings, too).
- Cookies and tracking tech: Dropping non‑essential cookies before consent, or burying disclosures, breaches PECR. A clear Cookie Policy and compliant consent banner are essential.
- Publishing reviews, photos or case studies: Sharing names, images or story details without an appropriate lawful basis (or permission) can create MPI and data protection problems.
- Handling staff or customer complaints: Circulating allegations or private messages beyond those who need to know can push into misuse of private information or confidentiality breaches.
The pattern is the same in each: be upfront, collect the least amount of information needed, and document your reasoning so you can justify it if challenged.
What Laws Apply And What Do They Require?
Data Protection (UK GDPR and Data Protection Act 2018)
If you process personal data, you must comply with core principles: lawfulness, fairness and transparency; purpose limitation; data minimisation; accuracy; storage limitation; integrity and confidentiality; and accountability. In practice, that means you should:
- Identify a lawful basis for each processing activity (e.g. contract, legitimate interests, consent).
- Provide clear privacy information (usually via a Privacy Policy) to customers, staff and other individuals.
- Limit data to what’s necessary for a specific purpose, and set retention periods you’ll actually follow.
- Put in place appropriate security measures (technical and organisational), especially for sensitive data.
- Carry out a DPIA (data protection impact assessment) where processing is likely to result in high risk - common examples include systematic monitoring or using biometrics.
- Have contracts in place with suppliers who handle data for you (data processors), including a compliant Data Processing Agreement.
Remember that biometrics (like fingerprints or facial recognition) are “special category” data and need robust justification and safeguards before you deploy them in the workplace.
Privacy And Electronic Communications Regulations (PECR)
PECR sits alongside data protection law and covers cookies, electronic marketing and certain communications services. For most small businesses, the big ticket items are:
- Cookies: You’ll need consent for non‑essential cookies (analytics, advertising, etc.), delivered through a clear, granular consent mechanism and supported by a Cookie Policy.
- Marketing messages: Email and SMS marketing requires prior consent unless you can rely on the “soft opt‑in” (existing customer relationship, similar products and a clear opt‑out at collection and in every message).
Employment And Workplace Monitoring
Monitoring staff is possible, but you must do it fairly and transparently. Typical safeguards include a clear business purpose, impact assessments, consulting or informing staff, strict access controls, and keeping monitoring to the least intrusive method that achieves your aim. Hidden or excessive monitoring risks breaching data protection duties and the implied duty of trust and confidence.
Surveillance Cameras And Audio
If you use CCTV, you’ll need signage, a clear lawful basis, policies, access procedures and proportionate placement. Audio recording is particularly intrusive and rarely justified in general areas - use it only where necessary and with strong justification and warnings.
Confidentiality And Misuse Of Private Information
Even outside GDPR, disclosing someone’s private information can lead to MPI or breach of confidence claims. Be especially careful with medical information, HR issues, complaint details and anything an individual would reasonably expect to be kept private.
Criminal Law Considerations
Intercepting communications, unauthorised access to systems or devices, or aggressive surveillance can cross into criminal territory. If you’re unsure whether a monitoring technique is lawful, get advice before you deploy it.
How To Reduce The Risk Of An Invasion Of Privacy Claim
1) Map What You Collect And Why
List the personal data you collect across your business (website, point‑of‑sale, HR, CCTV, apps, support channels) and record the purpose, lawful basis, recipients, retention and security. This “data map” underpins everything else and helps you spot where you’re over‑collecting.
2) Pressure‑Test Your Lawful Bases
Don’t default to consent unless it’s freely given and optional. For many operations, legitimate interests or contract will be more appropriate - but you’ll still need to balance your interests against the individual’s rights and document your reasoning.
3) Be Transparent With Clear Notices
Set out what you do in plain English and make it easy to find. A well‑drafted Privacy Policy is essential for external transparency, and internal notices explain monitoring to staff and contractors. Keep both aligned with what actually happens in practice.
4) Keep Monitoring Proportionate
If you’re considering monitoring, ask: is there a less intrusive way to meet the same goal? Limit the scope (who, where, when), restrict access to data, and set deletion schedules. If you’re recording audio or filming staff areas, expect a higher bar to justify it and look closely at the guidance for workplace cameras and CCTV with audio.
5) Sort Out Cookies And Marketing
Implement a consent tool that blocks non‑essential cookies until the user opts in, and make sure your Cookie Policy lists the cookies you actually use. For email and SMS marketing, check if the soft opt‑in applies; if not, you’ll need explicit consent and easy opt‑out options.
6) Put The Right Contracts In Place
If a vendor processes personal data for you (hosting, CRM, payroll, CCTV storage), you’ll need a compliant Data Processing Agreement. For non‑disclosure of sensitive business or personal information outside data processing, get robust NDAs and confidentiality clauses in your commercial and employment contracts.
7) Train Your Team
Most privacy incidents stem from human error. Regular, short training on handling data, recognising phishing attempts, and when to escalate a potential breach will save you pain later. It doesn’t have to be complicated - focus on the risks your team actually encounters.
8) Prepare For Requests And Breaches
Have a simple playbook for responding to subject access requests (SARs), deletion requests and complaints, and know how you’ll triage a data breach (investigate, contain, assess risk, notify if required). If you’re new to SARs, this step‑by‑step guide to responding to subject access requests is a useful starting point.
9) Review Tools And Tech
Before rolling out monitoring software, call recording or analytics tools, check where data is stored, what’s collected by default and how to switch off unnecessary features. In the workplace, be especially careful with browsing or keystroke monitoring - our overview of internet monitoring at work explains what’s reasonable.
10) Document Your Decisions
Accountability is a GDPR principle for a reason. Keep short notes of key decisions (why you installed cameras, why call recording is necessary, how you configured cookies). If a complaint lands, being able to show your working can make all the difference.
What To Do If Someone Alleges You Invaded Their Privacy
Don’t panic - respond methodically. A calm, structured approach shows you’re taking the concern seriously and reduces escalation risk.
- Pause and preserve: Stop any processing that might worsen the situation. Preserve logs, emails, recordings and messages that may be relevant.
- Triage the issue: Is this a data protection complaint, an MPI allegation, a confidentiality concern, or a marketing/cookies issue? Identifying the lane helps you apply the right rules.
- Acknowledge quickly: A short, polite acknowledgement within a few days goes a long way while you investigate.
- Check your legal basis and notices: Can you justify the processing as necessary and proportionate, and did you inform people appropriately?
- Assess harm and risk: If personal data was exposed, consider whether the breach is likely to result in a risk to individuals’ rights and freedoms. If yes, you may need to notify the ICO and, in some cases, affected individuals.
- Offer practical remedies: Where appropriate, consider deleting or correcting data, switching off intrusive features, or updating signage or policies.
- Respond substantively: Provide a clear explanation of what happened and the steps taken. Avoid defensive language; show you’ve listened and improved.
- Escalate for advice: If litigation is threatened or the issue is complex (e.g. covert recordings, biometrics, criminal allegations), get tailored legal advice before you reply in detail.
- Close the loop and learn: Update procedures, training and documentation so the same issue doesn’t recur.
Essential Documents And Policies To Have In Place
Strong paperwork won’t just keep you compliant - it also makes your day‑to‑day smoother and gives customers and staff confidence that you take privacy seriously. Priority items include:
- Privacy Policy: A plain‑English notice covering what you collect, why, the lawful basis, retention, sharing, international transfers, rights and contact routes. Start with a tailored Privacy Policy that reflects your actual processing.
- Cookie Policy and Consent Banner: A clear Cookie Policy paired with a consent tool that blocks non‑essential cookies until the user opts in.
- Data Processing Agreement: Mandatory clauses with any supplier that processes personal data on your behalf - use a compliant Data Processing Agreement.
- CCTV/Monitoring Policy: A short policy and impact assessment explaining why monitoring is necessary, where it applies, who can access recordings and how long you keep them. Cross‑refer to your staff handbook and notices.
- Employee Monitoring Notice: Clear, upfront explanations of any device, email, call or internet monitoring, aligned with what you actually do in practice.
- Incident And SAR Procedures: A simple, written process for handling data breaches and individual rights requests so the team knows exactly what to do.
- Confidentiality And NDAs: Robust confidentiality terms in employment and contractor agreements, and NDAs for sensitive discussions.
Key Takeaways
- “Invasion of privacy” risks usually arise from unfair monitoring, over‑collection, poor transparency or unnecessary disclosures - fix these, and you reduce most of your exposure.
- Data protection law (UK GDPR/DPA 2018) is your main framework: identify a lawful basis, be transparent, minimise data, secure it properly and document your decisions.
- PECR adds extra rules for cookies and electronic marketing - non‑essential cookies need consent, and marketing must meet consent or soft opt‑in requirements.
- Keep monitoring proportionate, especially for CCTV and audio recording. Use signage, limit scope and justify why it’s necessary for your business.
- Have core documents in place from day one: a tailored Privacy Policy, Cookie Policy, and signed Data Processing Agreements with your processors.
- Train your team and set up simple playbooks for SARs and breaches so you can respond quickly and confidently if something goes wrong.
- If a complaint lands, pause, investigate and respond calmly. Where stakes are high or issues are complex, get tailored legal advice early.
If you’d like help reducing privacy risk in your business - from drafting a Privacy Policy to reviewing CCTV or staff monitoring - you can reach us at 08081347754 or team@sprintlaw.co.uk for a free, no‑obligations chat.


