Alex is Sprintlaw’s co-founder and principal lawyer. Alex previously worked at a top-tier firm as a lawyer specialising in technology and media contracts, and founded a digital agency which he sold in 2015.
What You Must Do Immediately After An NHS Data Breach (Step-By-Step)
- Step 1: Contain The Incident
- Step 2: Assess What Happened (What Data, Who, How Many)
- Step 3: Escalate Internally And Follow Your Incident Plan
- Step 4: Notify The Relevant Parties (Often Including The NHS Client)
- Step 5: Consider Whether The ICO Must Be Notified (72-Hour Rule)
- Step 6: Consider Whether Individuals Must Be Told
- Step 7: Document Everything
- Key Takeaways
If your small business provides services to the NHS (or to organisations within the wider health and social care sector), you might handle NHS data as part of your day-to-day work.
That could mean anything from patient contact details in a booking system, to test results in a lab workflow, to staff HR data in an outsourced payroll arrangement, to clinical notes inside an app.
And if something goes wrong, an NHS data breach can escalate quickly. You may be dealing with urgent operational pressure, strict contractual requirements, reputational risk, and regulatory obligations under the UK GDPR and the Data Protection Act 2018.
Let’s walk through what an NHS data breach usually means, why it’s treated so seriously, and what you should do (and have in place) if you handle NHS data.
What Counts As NHS Data (And What Is An NHS Data Breach)?
In plain terms, “NHS data” is information associated with the NHS or NHS-related services. In most business contexts, this will include personal data (and often special category data) under UK GDPR.
Common Types Of NHS Data Businesses Handle
- Patient personal data: names, addresses, NHS numbers, dates of birth, contact details.
- Patient health data (special category data): symptoms, diagnoses, medications, test results, appointment notes, care plans.
- Staff data: employee records, payroll, rota information, occupational health notes (which can also be special category data).
- Operational data: internal NHS communications, service performance data, and system access logs (which may still be personal data if linked to individuals).
What Is An NHS Data Breach?
An NHS data breach is usually a type of personal data breach. Under UK GDPR, a personal data breach is a security incident that leads to the accidental or unlawful:
- destruction of personal data
- loss of personal data
- alteration of personal data
- unauthorised disclosure of personal data
- unauthorised access to personal data
Some common real-world examples for small businesses include:
- sending patient information to the wrong email address
- losing an unencrypted laptop, phone, or USB containing patient data
- an employee account being compromised (phishing, weak passwords, no MFA)
- an IT supplier exposing a database to the internet due to misconfiguration
- ransomware encrypting systems that store or transmit NHS data
Even if you’re “only” processing NHS data on behalf of someone else, you may still have immediate legal and contractual duties when a breach happens.
Why NHS Data Breaches Are High-Risk For Small Businesses
Handling NHS data is not like handling a standard customer mailing list.
Health data is generally special category data under UK GDPR. That means the law expects a higher standard of protection because the impact on individuals can be more serious if the data is exposed or misused.
The Main Risks If You Get It Wrong
- Regulatory risk: complaints, investigations, and potential enforcement action by the ICO (Information Commissioner’s Office).
- Contract risk: breach of NHS contractual requirements, potential termination, suspension, or loss of future opportunities.
- Operational risk: disruption to your service delivery (especially during ransomware or system outages).
- Reputational risk: trust can be hard to rebuild once you’re linked to an NHS data breach.
- Claims risk: individuals may bring claims if they’ve suffered harm, distress, or financial loss connected to the breach.
The good news is that most of the practical risk can be reduced if you set up your compliance properly from day one and run a clear incident response process.
Are You The Controller Or Processor (And Why Does It Matter)?
When NHS data is involved, the first legal question is often: are you a data controller or a data processor?
This matters because it affects:
- who has the legal duty to notify the ICO
- who must inform affected individuals
- what must be included in your contracts
- how quickly you must escalate incidents internally and externally
Quick Definitions (In Plain English)
- Controller: the organisation that decides why and how personal data is processed.
- Processor: the organisation that processes personal data on the controller’s instructions.
Many small businesses working with the NHS are processors (for example, hosting, support desk services, software providers, analytics providers, transcription services, or outsourced admin). But some will be controllers (or joint controllers) depending on what decisions they make about the data.
Either way, you’ll typically need a robust Data Processing Agreement in place with the party you’re working with, because NHS and health sector contracts often expect strong data protection clauses, clear incident notification rules, and alignment with information governance requirements.
Don’t Guess: Map Your Data Flows
If you’re not 100% sure whether you’re a controller or processor, don’t stress - but don’t guess either.
A short data mapping exercise can clarify:
- what NHS data you receive
- where it is stored (devices, cloud systems, backups)
- who can access it
- who it is shared with (sub-processors, contractors)
- how long you keep it
This mapping becomes invaluable when responding to an NHS data breach because you can quickly work out what was affected and what containment steps are realistic.
What You Must Do Immediately After An NHS Data Breach (Step-By-Step)
If you suspect an NHS data breach has occurred, speed and structure matter. Your goal is to contain the breach, protect individuals, and meet your reporting obligations.
Step 1: Contain The Incident
- Isolate affected devices or accounts (especially for malware/ransomware incidents).
- Disable compromised user credentials and reset passwords.
- Preserve logs and evidence (you may need these for forensic review).
- Stop the problematic processing activity (for example, pause an integration that is sending data incorrectly).
If you have an internal IT function, this often starts there. If you rely on outsourced IT, contact them immediately - and ensure your contracts allow urgent incident response support.
Step 2: Assess What Happened (What Data, Who, How Many)
You’ll need to quickly establish:
- what happened and when (timeline)
- what categories of NHS data were involved
- how many individuals are affected (even if it’s an estimate)
- whether the data was actually accessed or merely exposed
- what protections existed (encryption, access controls, MFA)
- the likely harm to individuals (risk assessment)
This assessment drives the next steps - including whether the incident is reportable to the ICO.
Step 3: Escalate Internally And Follow Your Incident Plan
Even if your team is small, you should have clear decision-makers and a documented response process.
Ideally, you’ll have a Data Breach Response Plan that sets out:
- who leads the response
- who communicates with clients (including NHS stakeholders)
- how you document decisions and evidence
- how and when you obtain legal advice
Step 4: Notify The Relevant Parties (Often Including The NHS Client)
If you are a processor, you generally must notify the controller (your NHS client or the relevant health organisation) without undue delay after becoming aware of a breach.
Your contract may require:
- notification within a specific timeframe (sometimes very short)
- specific breach report content (systems affected, remediation, root cause)
- support with the client’s regulatory reporting
This is one reason it’s worth getting your contracts and operational policies right early - it’s much harder to do under pressure during an active breach.
Step 5: Consider Whether The ICO Must Be Notified (72-Hour Rule)
Under UK GDPR, the controller must notify the ICO within 72 hours of becoming aware of a personal data breach if it is likely to result in a risk to the rights and freedoms of individuals.
Where you’re acting purely as a processor for the relevant processing, you would usually notify the controller (not the ICO) and provide enough information for the controller to decide whether it needs to notify. However, some suppliers are controllers or joint controllers for certain processing activities (even if they are processors for others) - and in those cases, ICO notification duties can apply to you for that controller/joint-controller processing.
If you’re unsure whether you’re acting as controller, processor, or both, it’s a good time to get legal advice quickly.
Step 6: Consider Whether Individuals Must Be Told
If the breach is likely to result in a high risk to individuals (for example, exposure of sensitive health data), the controller may also need to communicate the breach to affected individuals without undue delay.
Even if your client handles the communications, you may be required to support them with:
- information needed for accurate notifications
- technical explanations of what happened
- remediation steps and protective measures
Step 7: Document Everything
UK GDPR expects you to document personal data breaches, including those you decide are not reportable.
Keep a written record of:
- facts of the incident
- effects and likely impacts
- decisions made (and why)
- containment and remediation actions
This documentation can be critical if a regulator asks questions later - and it’s also useful for improving your security and training after the event.
How To Prevent An NHS Data Breach (The Practical Compliance Basics)
Most NHS-related suppliers don’t get caught out because they don’t care. They get caught out because they’ve grown quickly, added new systems, hired new staff, or started working with contractors - and the compliance pieces didn’t keep pace.
Here are the foundations you should consider if you handle NHS data.
1) Get Your Privacy Compliance Framework Right
At a minimum, you should understand your obligations under:
- UK GDPR
- Data Protection Act 2018
- confidentiality and information governance expectations in the health sector
Many businesses benefit from a structured GDPR package approach so you’re not piecing together compliance reactively.
You’ll also usually need a properly drafted Privacy Policy where you collect personal data as a controller (for example, via your website, patient-facing app, or recruitment processes).
2) Control Who Can Access NHS Data (And Prove It)
A big cause of breaches is excessive access. Practical steps include:
- role-based access controls (only give staff the access they actually need)
- multi-factor authentication (MFA) for email, cloud storage, and admin tools
- strong password rules and password managers
- offboarding processes (immediately remove access when someone leaves)
- audit logs and monitoring for suspicious access patterns
If your team uses cloud tools to store or share NHS data, it’s worth checking whether your setup is compliant (and whether staff are using personal accounts). A quick sense-check on cloud storage compliance can prevent surprisingly common mistakes.
3) Train Staff And Set Clear Usage Rules
For small businesses, “human error” is often the weak point - but it’s also one of the easiest risks to reduce with clear policies and training.
Consider implementing an Acceptable Use Policy that covers:
- handling sensitive NHS information
- personal devices and remote working rules
- approved tools for file sharing and messaging
- reporting suspicious emails and phishing attempts
- what to do if a device is lost or stolen
If you employ staff who regularly handle sensitive records, your internal employment documents should also align with your privacy and confidentiality expectations. (This can be built into contracts, policies, and training.)
4) Lock Down Your Supplier Chain (Sub-Processors And Contractors)
If you outsource any part of your service (IT support, hosting, analytics, call handling, transcription, or development work), you should treat that supplier as a potential risk point.
Make sure:
- you’ve done basic due diligence before onboarding them
- you have the right contractual protections in place
- their access to NHS data is limited and monitored
- they have their own breach notification obligations to you
This is where your Data Processing Agreement (and any sub-processing clauses) becomes more than a “nice to have”. It’s part of proving you’ve taken appropriate organisational measures.
5) Have A Realistic Retention And Deletion Process
Keeping NHS data “just in case” is risky. The longer you keep data, the more exposure you carry.
As a general rule, you should:
- only keep personal data for as long as you genuinely need it
- have a documented retention schedule (even a simple one)
- securely delete data when it’s no longer needed
- ensure backups are handled properly (and tested)
The exact timeframes depend on your role, your contract, and legal/regulatory requirements - so tailored advice is important here.
What Legal Documents And Clauses Should You Have In Place When Handling NHS Data?
If you’re supplying services that involve NHS data, your contracts and policies need to match the risk profile. This is not the place for generic templates.
Key Documents To Consider
- Data Processing Agreement (where you process data on a client’s instructions): your Data Processing Agreement should cover security measures, breach notification duties, sub-processing rules, and audit rights.
- Privacy Policy (where you’re a controller): a compliant Privacy Policy helps you meet transparency obligations and reduces complaint risk.
- Data Breach Response Plan: your Data Breach Response Plan should set out internal workflows so you’re not deciding everything in the heat of the moment.
- Acceptable Use Policy: an Acceptable Use Policy sets behavioural rules around devices, logins, sharing, and reporting security incidents.
What NHS Clients Often Expect (Commercial Reality)
Depending on your contract and the nature of the services, NHS clients may also expect to see evidence of:
- secure development practices (if you’re building software)
- incident response testing and escalation procedures
- staff training and confidentiality controls
- clear sub-processor management
- business continuity planning
Even if you’re a small supplier, these expectations are increasingly standard. The key is making it achievable and proportionate - but still defensible if something goes wrong.
Key Takeaways
- An NHS data breach is usually a personal data breach involving NHS-related information, often including special category health data, which attracts higher compliance expectations.
- Your first step is to work out whether you’re acting as a controller or processor, because this affects reporting duties, contract terms, and how you respond to incidents.
- When an NHS data breach happens, focus on quick containment, a clear risk assessment, prompt notification to the right parties (including your NHS client), and thorough documentation.
- Many breaches are preventable with sensible controls: access management, MFA, staff training, supplier due diligence, and clear retention/deletion rules.
- Strong contracts and policies matter in the health sector - including a Data Processing Agreement, Privacy Policy, Acceptable Use Policy, and a Data Breach Response Plan that you can actually follow under pressure.
- If you handle NHS data, it’s worth getting tailored legal advice early, so you’re protected from day one and can scale your services with confidence.
If you’d like help tightening up your contracts and privacy compliance for NHS data (or support responding to an NHS data breach), you can reach us at 08081347754 or team@sprintlaw.co.uk for a free, no-obligations chat.


