Alex is Sprintlaw’s co-founder and principal lawyer. Alex previously worked at a top-tier firm as a lawyer specialising in technology and media contracts, and founded a digital agency which he sold in 2015.
Headlines about an “NHS GDPR breach” can feel a world away from the day-to-day of running a small business. But the core lessons are the same for every organisation that handles personal data: know your responsibilities, reduce risk up front and be ready to respond fast if something goes wrong.
In this guide, we’ll translate big‑system data protection problems into practical, doable steps for SMEs. You’ll see what “counts” as a breach under UK GDPR, what the law expects within 72 hours, and the policies, contracts and tech hygiene that keep you protected from day one.
Why “NHS GDPR Breach” Stories Matter For Small Businesses
When a high‑profile sector like the NHS experiences a data incident, it highlights the same weak points most small businesses face: outdated systems, patchy access controls, over‑permissive sharing, vendor vulnerabilities and inconsistent training.
The UK General Data Protection Regulation (UK GDPR), read with the Data Protection Act 2018, applies to any UK business that processes personal data. So, whether you’re running a clinic, an e‑commerce brand or a professional services firm, the compliance bar is set by the same principles the NHS must navigate-just scaled to your size and risk.
Here’s why those headlines are relevant to you:
- Attackers target the weakest link. SMEs are often easier to breach than large institutions because of lean IT and informal processes.
- Fines aren’t the only cost. Downtime, lost trust, regulatory attention and contract losses can hit harder than a monetary penalty.
- Third parties are a major risk. Many breaches begin with a supplier or software tool. Your obligations don’t stop at your firewall.
- Human error is common. Mis‑sent emails, exposed spreadsheets or lost devices happen in every business. Good controls make them less likely and less harmful.
What Counts As A Personal Data Breach Under UK GDPR?
A “personal data breach” isn’t only about hackers. Under UK GDPR, it’s any security incident that leads to accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data. Typical SME examples include:
- Sending an email attachment to the wrong client (unauthorised disclosure).
- Losing an unencrypted laptop or phone that contains customer details (loss and unauthorised access risk).
- Ransomware encrypting your files (loss of availability; potential unauthorised access).
- Exposing a database through misconfigured cloud storage (unauthorised access).
- Accidentally deleting key records without a backup (loss of integrity/availability).
Two points to keep in mind:
- Risk matters. Not every incident is reportable, but you must assess the likelihood and severity of risk to individuals’ rights and freedoms (e.g. identity theft, financial loss, distress).
- Special category data raises stakes. Health data, biometric data and similar categories demand stronger safeguards and more urgent responses if exposed-another reason NHS cases draw attention.
If you collect personal information online, ensure your Privacy Policy clearly explains what you collect, how you use it, who you share it with and users’ rights. Transparent notices reduce regulatory risk and help customers trust your brand.
Your Legal Duties If You Suffer A Breach (And The 72-Hour Rule)
When an incident occurs, time is critical. UK GDPR requires you to act quickly and keep good records, even if you ultimately decide the breach is not notifiable.
1) Investigate And Contain Immediately
Identify what happened, what data is affected, who is impacted and whether the data was encrypted or otherwise protected. Contain the issue: revoke access, change credentials, isolate systems, restore from backups and start your incident log.
Having a documented Data Breach Response Plan before an incident makes this step much faster and more consistent across your team.
2) Assess The Risk To Individuals
Ask: what harm could realistically result? Consider sensitivity (health data vs. email address), volume, whether data was encrypted, potential misuse and the ease of identification.
3) Notify The ICO Within 72 Hours (If Required)
If the breach is likely to result in a risk to individuals’ rights and freedoms, you must notify the Information Commissioner’s Office without undue delay and, where feasible, within 72 hours of becoming aware. If you miss the 72‑hour window, you must explain why.
Your notification typically includes what happened, categories and approximate number of data subjects and records, likely consequences and measures taken or proposed to address the breach.
4) Tell Affected Individuals (If High Risk)
If the risk to individuals is “high”, you must inform them without undue delay in clear, plain language, explaining what happened, potential consequences and steps they can take (e.g. password changes, monitoring accounts) along with your contact point.
5) Document Everything
UK GDPR expects you to keep a breach register documenting facts, effects and remedial steps-even for incidents you decide are not notifiable. This record demonstrates accountability if the regulator asks questions later.
Practical Steps To Reduce The Risk Of A Breach
The best time to “win” a breach is before it happens. Here’s a pragmatic, SME‑friendly roadmap modelled on lessons that large‑system breaches (including NHS cases) repeatedly teach us.
Governance And Risk Assessment
- Appoint a senior owner for data protection. They don’t need to be a “DPO” unless required, but they should drive compliance day‑to‑day.
- Map your data. Know what you collect, where it lives, who has access and where it flows (systems and suppliers).
- Use DPIAs for higher‑risk processing. If you introduce new tech, track location data, or process special category data, a structured risk assessment helps you spot and mitigate issues early.
Policies And Notices
- Publish a clear, tailored Privacy Policy and make sure your actual practices match it.
- Set a Cookie Policy and obtain consent where required, especially for non‑essential cookies and analytics.
- Adopt a bring‑your‑own‑device policy or move to managed devices; uncontrolled personal devices are a classic breach vector. For a deeper dive, see this overview of work phones vs BYOD risks.
- Create a Data Breach Response Plan so your first 24–72 hours are structured and compliant.
Access Controls And Training
- Principle of least privilege. Staff should only access the data they need, nothing more.
- Strong authentication. Use multi‑factor authentication on email, cloud tools and any system that holds personal data.
- Regular training. Short, practical refreshers on phishing, safe sharing and handling rights requests reduce human error-the most common breach cause.
Secure Technology Choices
- Use reputable, up‑to‑date SaaS platforms with good security certifications, and switch on available security settings.
- Encrypt devices and data at rest where feasible; ensure mobile devices can be remotely wiped if lost or stolen.
- Configure cloud storage carefully. Misconfiguration is a common route to exposure; sense‑check sharing links and permissions. If you store files in the cloud, this discussion about Google Drive and GDPR is a helpful reference point.
Retention, Minimisation And Backups
- Keep only what you need, for only as long as you need it. Shorter retention means less to lose and less to notify.
- Set and follow deletion schedules, especially for old exports and spreadsheets sitting on shared drives.
- Test your backups. A recoverable backup can turn a ransomware disaster into a short outage.
Prepare For Rights Requests
- Have a playbook for handling Subject Access Requests (SARs), corrections and deletions.
- Align your process to timing rules. This practical guide to SAR deadlines is a good benchmark for your internal SLAs.
- Offer a simple route for requests, such as an online Access Request Form, so staff don’t miss or mishandle them.
Working With Suppliers: Controllers, Processors And Contracts
Many breaches begin with a third party-exactly the risk highlighted in high‑profile public‑sector incidents. If you use cloud tools, marketing platforms, payroll services, IT support or fulfilment partners, you must lock in the right roles and contracts.
Controller Vs Processor (In Plain English)
- You’re a controller when you decide the purpose and means of processing (e.g. your customer database).
- A supplier is a processor when it processes personal data on your behalf (e.g. your email marketing platform).
- Two parties can be independent controllers if you each decide your own purposes (e.g. a bank processing your payment details for its own compliance).
Getting this wrong creates gaps in accountability-and gaps are where breaches slip through.
Must‑Have Contracts With Data Processors
UK GDPR requires that you put specific terms in place whenever a processor handles personal data for you. The easiest way is a tailored Data Processing Agreement that covers the mandatory clauses (security, confidentiality, sub‑processors, assistance, deletion/return, audits, etc.).
Where you share data with another controller (e.g. a partner co‑hosting an event), a clear Data Sharing Agreement sets boundaries, responsibilities and lawful bases, reducing the risk of over‑sharing and mixed messages to individuals.
Due Diligence And Monitoring
- Vendor checks. Look for security certifications, breach history and realistic SLAs. Make sure they can support you during incidents and SARs.
- International transfers. If data leaves the UK, ensure a valid transfer mechanism and assess local laws that might impact protection.
- Change control. If a vendor adds sub‑processors or moves data centres, your contract should give you visibility and a right to object where appropriate.
Handling Rights Requests And Complaints After A Breach
Breaches often trigger an increase in SARs and complaints. Having a calm, compliant process can be the difference between a contained issue and a protracted regulator engagement.
Build A Repeatable SAR Process
Confirm identity, scope the request, search all relevant systems, apply exemptions carefully and respond within the statutory timescale. This step‑by‑step guide to responding to SARs outlines a sensible workflow your team can follow.
Set Up Complaint Handling
A documented privacy complaint handling procedure ensures concerns are acknowledged promptly, escalated appropriately and resolved consistently. Good complaint management demonstrates accountability to both customers and the ICO.
Communicate With Empathy And Clarity
When notifying individuals, focus on plain English and practical steps they can take. Provide a named contact point and avoid speculation. Transparency builds trust-even when the news isn’t good.
Review And Improve
Every incident is a lesson. After containment, run a post‑incident review: what worked, what didn’t, and what changes (technical, contractual, procedural or training) will reduce the chance and impact of a repeat event.
Key Takeaways
- Breaches aren’t just for big institutions. An “NHS GDPR breach” headline underscores risks that SMEs face every day-third‑party vulnerabilities, access control gaps and human error.
- Know what a breach is. It covers loss, alteration, unauthorised disclosure or access to personal data-not just hacking.
- Act fast and document. Assess risk quickly, notify the ICO within 72 hours if required, inform individuals if risk is high and keep a detailed breach log.
- Build defences now. Clear policies (including a tailored Privacy Policy and Data Breach Response Plan), strong access controls, training, encryption and sensible retention all reduce the likelihood and impact of incidents.
- Lock down your supply chain. Use a proper Data Processing Agreement with processors and a Data Sharing Agreement where you exchange data with other controllers.
- Be prepared for follow‑on requests. Set a robust process for SARs and complaints so you can respond confidently and on time after an incident.
If you’d like tailored help strengthening your GDPR compliance, drafting the right contracts and policies, or building a practical incident response plan, you can reach us at 08081347754 or team@sprintlaw.co.uk for a free, no‑obligations chat.


