Alex is Sprintlaw’s co-founder and principal lawyer. Alex previously worked at a top-tier firm as a lawyer specialising in technology and media contracts, and founded a digital agency which he sold in 2015.
If you run a small business, you’re probably collecting personal data every day - customer emails, delivery addresses, staff records, supplier contacts, and maybe even CCTV footage.
Most of the time, it’s business as usual. But if something goes wrong (a hacked inbox, a lost laptop, a mis-sent spreadsheet), the question quickly becomes: what GDPR fines can apply in the UK, and how bad can they get?
The good news is that regulators don’t generally set out to “catch out” small businesses for honest mistakes. But they do expect you to take data protection seriously, have sensible safeguards, and respond properly if there’s a breach.
Below, we break down how GDPR fines in the UK work in practice, what triggers investigations, how penalties are calculated, and the steps you can take to reduce your risk.
What Are GDPR Fines In The UK (And Who Issues Them)?
In the UK, data protection is mainly governed by:
- the UK GDPR (the UK’s version of the General Data Protection Regulation); and
- the Data Protection Act 2018.
The regulator that enforces these rules is the Information Commissioner’s Office (ICO). If the ICO finds serious non-compliance, it can take enforcement action such as:
- issuing warnings and reprimands;
- ordering you to do (or stop doing) certain processing;
- requiring audits or changes to security practices; and
- imposing monetary penalties (i.e. GDPR fines).
It’s also worth keeping in mind that fines are only one part of your overall risk. A data breach can also lead to:
- compensation claims from individuals (for example, if they suffer financial loss or distress);
- contractual disputes (especially if you process data for other businesses); and
- reputational damage that impacts sales and customer trust.
So even if a regulator doesn’t issue a big fine, the fallout can still be costly if you’re not prepared.
How Much Can GDPR Fines UK Actually Be?
When people search “GDPR fines UK”, they’re often trying to understand the maximum exposure. Under the UK GDPR, the ICO can impose fines on a tiered basis. In plain English, there are two main bands.
Lower Tier Fines
For certain types of non-compliance (often administrative or procedural failures, such as some controller/processor obligations and record-keeping requirements), the maximum is the greater of:
- £8.7 million, or
- 2% of your total worldwide annual turnover (from the previous financial year).
Higher Tier Fines
For more serious breaches (for example, breaches of fundamental principles like lawfulness, fairness, transparency, or serious security failures - and in some cases, failures relating to individuals’ rights), the maximum is the greater of:
- £17.5 million, or
- 4% of your total worldwide annual turnover (from the previous financial year).
Important: “maximum” doesn’t mean automatic. The ICO still considers context and proportionality, and small businesses don’t typically receive maximum-level fines.
But it does mean that if your business handles a lot of personal data (or sensitive data), a serious security lapse can carry real financial risk.
What Triggers GDPR Breach Fines UK? Common Scenarios For Small Businesses
A lot of owners assume that GDPR breach fines in the UK only happen to big tech companies or businesses with massive databases.
In practice, small businesses can still face enforcement action if the breach shows poor controls, repeated mistakes, or careless handling of personal information. Here are some common “real world” scenarios that can lead to risk.
1) Email And Account Compromise (Hacked Inboxes)
This is one of the most common causes of data breaches. For example:
- an employee’s email account is hacked;
- invoices or payroll information are exposed;
- fraudsters email customers “from your address”; or
- your mailbox rules are altered so you don’t see certain communications.
Even if the hack happened due to phishing, the ICO may look at whether you had appropriate security in place (like MFA, access controls, training, and breach response planning).
2) Mis-Sent Personal Data (Human Error)
Accidentally sending personal data to the wrong person is a classic issue - and it doesn’t have to be a big leak to matter. Examples include:
- sending a customer list to the wrong supplier;
- CC’ing instead of BCC’ing a group email;
- posting documents to the wrong address; or
- sharing the wrong file link in Google Drive/Dropbox.
Human error happens. The legal question is whether you’ve put reasonable organisational measures in place to reduce the risk (and to catch mistakes early).
3) Lost Devices And Unencrypted Storage
Laptops, phones and USB drives still go missing. If those devices contain personal data (staff documents, customer orders, CRM exports) and aren’t properly protected, your risk goes up quickly.
4) Poor Supplier Controls (Your Vendors Can Create Your Risk)
If you use a third party to process personal data - like a payroll provider, marketing platform, CRM, booking system, or IT support - you may need a compliant Data Processing Agreement in place, and you should be comfortable that the supplier has proper security.
If something goes wrong at supplier level, the ICO may look at how you selected and managed them.
5) CCTV And Workplace Monitoring Issues
If you use CCTV or monitoring tools, the risks aren’t just security-related - they’re also about fairness and transparency. For example, recording audio, monitoring staff without clear policies, or retaining footage too long can create compliance issues.
Even if you never have a “hack”, you can still face a data protection fine if the setup breaches UK GDPR requirements around transparency, purpose limitation, and data minimisation.
How Does The ICO Decide Whether To Issue A Data Breach Fine UK?
There isn’t a single “calculator” that determines fines for data breaches in the UK. The ICO looks at the facts, and it focuses on whether the penalty is effective, proportionate and dissuasive.
When deciding whether to issue a fine (and how much), the ICO typically considers factors like:
- Nature and seriousness: What happened, how sensitive was the data, and how many people were affected?
- Duration: Was this a one-off incident, or did it continue over time?
- Intent: Was it deliberate, reckless, negligent, or a genuine mistake with safeguards in place?
- Security measures: Did you have reasonable technical and organisational measures (e.g. access controls, MFA, encryption, staff training)?
- Response: How quickly did you investigate, contain, and mitigate the issue?
- Prior history: Have there been previous incidents or warnings?
- Cooperation: Did you cooperate with the ICO?
- Financial size: The ICO may consider your turnover and ability to pay when setting an amount.
For small businesses, a key theme is often reasonableness. The ICO generally expects your approach to match the scale and risks of your business - but “we’re small” isn’t a complete defence if you handle personal data without basic safeguards.
Do You Always Have To Report A Data Breach?
No - but sometimes you do.
Under UK GDPR, you must report certain personal data breaches to the ICO within 72 hours of becoming aware of them, unless the breach is unlikely to result in a risk to individuals’ rights and freedoms.
You may also need to notify the individuals affected if the breach is likely to result in a high risk to them.
This is where many businesses get stuck. If you’re unsure, it helps to have a documented process in place - ideally before a breach happens - such as a Data Breach Response Plan.
How To Reduce Your Risk Of GDPR Fines UK (Practical Steps You Can Take Now)
Most businesses don’t fall foul of the rules because they don’t care. They get caught out because they haven’t built data protection into day-to-day operations.
Here are practical steps that can meaningfully reduce your risk of GDPR fines in the UK - and just as importantly, help you respond properly if something goes wrong.
1) Get Clear On What Data You Collect (And Why)
Start simple:
- What personal data do you collect (customers, leads, staff, suppliers)?
- Where is it stored (email, spreadsheets, cloud platforms, paper files)?
- Who has access?
- How long do you keep it?
- Why do you need it (and what’s your legal basis)?
This sounds basic, but it’s the foundation for everything else. If you don’t know where data lives, it’s hard to protect it.
2) Use The Right Documents (And Keep Them Aligned With Reality)
For many small businesses, GDPR compliance fails because the paperwork doesn’t match what the business actually does.
A good starting point is making sure you have a clear Privacy Policy that accurately explains what you collect, why, and who you share it with.
If you deal with privacy compliance more broadly, using a structured approach like a GDPR package can help pull the core building blocks together in a consistent way (rather than trying to patchwork it over time).
3) Tighten Access Controls And Staff Rules
One of the quickest wins is reducing who can see what:
- give system access only to people who genuinely need it;
- use unique logins (no shared accounts);
- turn on MFA wherever possible;
- review permissions regularly (especially when staff leave).
On the people side, make sure your team knows what “good” looks like - for example, rules around password security, device usage, downloads, and file sharing. A well-drafted Acceptable Use Policy can make expectations clear and create accountability.
4) Be Careful With Marketing Lists
Email marketing is a common area where businesses accidentally create compliance risk. Make sure you understand:
- when you can rely on consent vs legitimate interests;
- how people can opt out (and how quickly you action it); and
- how you record marketing preferences.
Even if marketing mistakes don’t always lead to a “data breach fine”, they can trigger complaints and ICO scrutiny - and they often reveal wider gaps in governance.
5) Prepare For Subject Access Requests (SARs)
When someone asks for a copy of their personal data, you need to respond within the legal timeframes and in the right way. Poor SAR handling can escalate tensions after a breach, and it can also trigger complaints on its own.
Having a consistent process (and template) helps - for example, an Access Request Form that your team knows how to use.
6) Document Your Compliance Decisions
If the ICO ever asks questions, it helps to be able to show your working. That might include:
- risk assessments for new tools and platforms;
- training records;
- security measures you’ve implemented; and
- incident logs (even for near misses).
This is part of the UK GDPR’s “accountability” principle - and it’s often what separates a business that made an honest mistake from one that was careless.
What To Do If You’ve Had A Breach (And You’re Worried About Fines For Data Breaches UK)
If you suspect a breach, don’t panic - but do act quickly. Your first few steps can make a real difference to your legal exposure and your ability to contain harm.
Step 1: Contain The Incident
- Secure accounts (reset passwords, enable MFA, revoke sessions).
- Isolate affected devices/systems.
- Stop the incorrect disclosure if possible (e.g. revoke access links).
Step 2: Assess What Happened And What Data Is Affected
Work out:
- what personal data is involved (names, addresses, bank details, health data, etc.);
- how many individuals are affected;
- who may have accessed it; and
- what the likely harm/risk is.
Step 3: Decide Whether To Notify The ICO (And Individuals)
This is a legal judgement call based on risk. If notification is required, you generally have 72 hours from awareness.
Even where notification isn’t required, you should still document the breach internally (including your reasoning).
Step 4: Communicate Carefully
If you need to tell customers, staff, or suppliers, you’ll want messaging that is accurate, clear, and not misleading. In the early stage, avoid assumptions - focus on what you know, what you’re doing, and what affected individuals should do next (for example, changing passwords).
Step 5: Fix The Root Cause (Not Just The Symptom)
The ICO will often look at what changes you made afterwards. If the breach happened because:
- accounts weren’t protected properly, fix access control and MFA;
- staff didn’t understand the rules, train and implement policies;
- suppliers were unmanaged, put appropriate agreements and checks in place; or
- your documents were outdated, update them so they reflect reality.
This is also the point where tailored advice is really helpful. Data incidents can involve overlapping issues - privacy law, contracts with customers, employment considerations, and sometimes even regulatory reporting beyond the ICO depending on your sector.
Key Takeaways
- GDPR fines in the UK are enforced by the ICO under the UK GDPR and the Data Protection Act 2018, and they can apply to small businesses as well as large organisations.
- The legal maximums can be very high (tiered fines up to £17.5 million or 4% of turnover), but the ICO usually assesses penalties based on seriousness, risk, and proportionality.
- Common drivers of data breach fines risk include hacked email accounts, mis-sent emails, poor access controls, unencrypted devices, and weak supplier management.
- Having solid foundations - like a clear Privacy Policy, proper supplier contracts, and internal security policies - can significantly reduce both breach likelihood and penalty risk.
- If a breach happens, move fast: contain it, assess the data and risk, decide whether to notify within 72 hours, communicate carefully, and fix the root cause.
- If you’re unsure what your business needs, it’s worth getting tailored legal support - doing it properly early can save a lot of time, money, and stress later.
If you would like help with GDPR compliance, privacy documents, or support responding to a data breach, you can reach us at 08081347754 or team@sprintlaw.co.uk for a free, no-obligations chat.


