Alex is Sprintlaw’s co-founder and principal lawyer. Alex previously worked at a top-tier firm as a lawyer specialising in technology and media contracts, and founded a digital agency which he sold in 2015.
Handling personal data is part of doing business today - whether you’re running an online store, a clinic, a consultancy or a local service. The flip side is that if something goes wrong with that data, you can face investigations and data breach fines from the UK’s data protection regulator.
Don’t stress - with the right preparation, you can reduce the risk of a breach and put yourself in the best position if one does happen. In this guide, we’ll walk through what counts as a breach, how fines are calculated, what the ICO looks at, and the concrete steps you can take to protect your business from day one.
What Counts As A Data Breach Under UK Law?
Under the UK GDPR and the Data Protection Act 2018, a “personal data breach” is any security incident that leads to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data. It’s broader than cyber-attacks - simple mistakes can qualify.
Common examples for small businesses include:
- Sending an email with personal data to the wrong recipient (misaddressed emails or wrong attachment)
- Losing an unencrypted laptop, phone or USB containing customer information
- Unauthorised employee access to records they don’t need for their job
- Ransomware or malware that encrypts customer files
- Publishing personal data on your website by accident (e.g. an export file uploaded publicly)
Not every breach results in a fine, but all breaches trigger obligations. If the breach is likely to result in a risk to people’s rights and freedoms, you must report it to the ICO within 72 hours of becoming aware of it, and in some cases notify affected individuals without undue delay. Keeping accurate records of incidents is mandatory, even if you don’t need to report them.
Two other regimes often overlap with breach obligations:
- PECR (Privacy and Electronic Communications Regulations) for cookies and electronic marketing practices. Poor cookie practices can expose you to enforcement alongside a data breach.
- Contractual duties with suppliers and clients - for example, failing to follow your own Data Processing Agreement could create breach of contract exposure as well as regulatory risk.
How Are Data Breach Fines Calculated By The ICO?
The Information Commissioner’s Office (ICO) can issue data breach fines up to the higher of £17.5 million or 4% of your global annual turnover for serious infringements. That’s the ceiling - most small businesses won’t face penalties anywhere near that level - but it shows how seriously the UK treats personal data.
In practice, the ICO uses a proportional approach. When deciding whether to impose a fine (and how much), the ICO will look at:
- The nature and severity of the breach - how many people were affected, what types of data (e.g. health or financial data) and for how long
- Whether the incident could have been prevented with basic measures (e.g. access controls, encryption, staff training)
- Your responsibility and role - controller vs processor - and whether you complied with your duties (e.g. Article 32 security, Article 33/34 notification)
- Your behaviour - did you detect quickly, act promptly, cooperate with the ICO, and communicate transparently?
- Any previous infringements or patterns of non-compliance
- Mitigating actions - such as immediate containment, offering support to affected individuals, and improvements to prevent recurrence
- Financial resources - fines must be effective, proportionate and dissuasive; the ICO considers the size and turnover of your business
Importantly, the ICO can also use other enforcement tools: warnings, reprimands, enforcement notices (requiring you to take or stop certain actions), and audits. Sometimes, the outcome is a formal reprimand with a requirement to improve practices rather than a monetary penalty - and strong mitigations and cooperation often make the difference.
Real-World Penalties And Triggers Small Businesses Should Know
While headlines often focus on large corporate penalties, smaller organisations are regularly investigated and sanctioned when basic safeguards are missing. Typical triggers include:
- Unencrypted devices with personal data being lost or stolen
- Failure to vet or monitor processors (e.g. a third-party vendor mishandles your customer data)
- Repeated misdirected emails containing sensitive information
- No lawful basis or transparency for data collection (e.g. no clear, compliant Privacy Policy)
- Ignored or late responses to individuals’ data rights, such as subject access requests
- Non-compliant cookie practices and tracking, often combined with inadequate security
Two practical lessons stand out for SMEs:
- Basic hygiene matters. The ICO expects encryption, access controls, staff training, and tested incident response as table stakes.
- Process failures compound risk. If a breach happens and you also miss the 72-hour notification window, or you can’t demonstrate accountability (e.g. no records, policies or contracts), fine exposure increases sharply.
Remember that individuals can complain directly to the ICO, and disgruntled customers or ex-employees commonly do. Keeping your house in order - both technical and procedural - reduces the likelihood a complaint results in enforcement.
What To Do Immediately After A Breach (Step-By-Step)
If you suspect a breach, act fast. The first 24–72 hours are crucial to limit harm and show accountability. Here’s a practical response sequence you can adapt into your internal playbook.
1) Contain And Assess
- Isolate affected systems, reset credentials, revoke access and stop the data flow.
- Identify what happened, what data is involved, how many people are affected, and the likely risks (e.g. identity theft, distress).
- Start contemporaneous notes - who did what, when, and why. Good records will matter.
2) Assemble Your Response Team
- Nominate a lead decision-maker (owner, director or DPO/lead privacy contact).
- Loop in IT/security support and legal support early - even a brief consultation helps you meet timelines and disclosures.
- Check your processor contracts. If a vendor is involved, trigger contractual incident clauses in your Data Processing Agreement.
3) Decide On Notifications
- Within 72 hours of becoming aware, decide whether the breach is reportable to the ICO. If yes, submit via the ICO’s online form; if late, explain why.
- If there’s a high risk to individuals, notify affected people without undue delay with clear, plain-English guidance on what happened and what they can do.
- Check other obligations - contractual notifications to clients, insurers, or regulators.
4) Support Affected Individuals
- Offer practical help proportionate to the risk (e.g. password resets, fraud monitoring guidance, helpline email).
- Communicate honestly and avoid speculation; send updates as you learn more.
5) Fix The Root Cause And Document
- Patch vulnerabilities, roll out extra controls, and train staff to address gaps.
- Complete an internal incident report and update policies and contracts to prevent recurrence.
- Create or refine your written Data Breach Response Plan so you’re faster next time.
How To Reduce Your Risk And Fine Exposure Before Anything Goes Wrong
Good compliance isn’t just “paperwork” - it directly reduces the chance and impact of a breach. These are the practical actions the ICO expects to see in place for SMEs.
1) Get Your Legal Foundations In Place
- Publish a clear, tailored Privacy Policy that explains what you collect, why, and how people can exercise their rights.
- Use processor contracts with the mandatory UK GDPR clauses. A robust Data Processing Agreement and a detailed Data Processing Schedule set out security, sub-processing, breach reporting and audit rights.
- Where you share data with other controllers, put a Data Sharing Agreement in place to allocate responsibilities.
- Make your website tracking compliant with a transparent Cookie Policy and settings that obtain valid consent for non-essential cookies.
2) Embed “Security By Design”
- Encrypt laptops and mobiles, enforce MFA, patch regularly, and restrict access on a “need-to-know” basis.
- Train staff on phishing, handling personal data, and your incident procedure at onboarding and annually.
- Run DPIAs (Data Protection Impact Assessments) for higher-risk processing (e.g. large-scale monitoring, sensitive data).
3) Prove Accountability
- Keep records of processing activities (what data you hold, why, where and who can access it).
- Have a written incident playbook, or adopt a tailored Data Breach Response Plan, and rehearse it.
- Respond on time to individual rights - particularly subject access. Knowing the SAR deadlines and process reduces complaint risk.
4) Tidy The Admin
- Pay the ICO data protection fee (if applicable) and record your registration; check any ICO fee exemptions you may qualify for.
- Maintain data retention schedules and securely delete what you no longer need.
- Where staff use AI tools with personal data, set rules via an internal policy such as a Generative AI usage policy, and train teams on acceptable use.
If this feels like a lot, a bundled approach such as a tailored GDPR Package can be a cost-effective way to get the essential policies, contracts and guidance in place quickly.
Frequently Asked Questions About Data Breach Fines
Will I Automatically Be Fined For A Breach?
No. Many breaches end in an investigation, a warning or a reprimand rather than a fine - especially if the incident was contained quickly, risk to individuals was minimal, and you can demonstrate strong controls and cooperation. However, repeated or negligent failures, serious harm, or ignoring your obligations will push you towards a monetary penalty.
Do Small Businesses Get Leniency?
The ICO considers proportionality and your financial resources, but it also looks at whether you met baseline expectations for security and governance. “We’re small” isn’t a defence if you’ve ignored basic measures like encryption, access controls, and staff training.
What’s The 72-Hour Rule?
If a breach is likely to pose a risk to people’s rights and freedoms, you must notify the ICO without undue delay and where feasible not later than 72 hours after becoming aware. If you take longer, you must explain the reasons. If there’s a high risk to individuals, you must also inform them directly and promptly.
Do I Have To Tell Customers?
Only where there’s a high risk to their rights and freedoms. In practice, if sensitive data is involved (e.g. health, financial data, credentials) and exposure could cause harm, you should expect to notify. Clear, practical advice in your notification can reduce harm and show accountability.
Can A Good Incident Response Reduce A Fine?
Yes. The ICO weighs your post-incident actions. Rapid containment, honest communication, timely notifications, meaningful support to individuals, and permanent fixes all mitigate enforcement. Being able to point to a well-drafted Data Breach Response Plan and evidence that you trained staff on it is powerful.
Contracts And Documents That Help Limit Liability
Legal documents won’t replace good security, but they are essential guardrails that reduce risk, allocate responsibilities and prove accountability - all of which influence how the ICO views your business.
- Privacy Policy: A compliant, plain-English Privacy Policy sets expectations and reduces complaints. It’s also your front line for transparency and lawful basis.
- Data Processing Agreement + Schedule: Make sure your processors sign a Data Processing Agreement with a detailed Data Processing Schedule covering security, breach reporting and sub-processor controls.
- Data Sharing Agreement: If you share data with other controllers, a Data Sharing Agreement clarifies who does what - including who notifies the ICO and individuals.
- Cookie Policy and Consent Controls: A clear Cookie Policy plus a compliant banner that respects choices helps you avoid PECR and UK GDPR issues.
- Incident Playbook: A written and tested Data Breach Response Plan accelerates containment and shows the ICO you take security seriously.
Avoid generic templates. These documents should reflect your actual data flows, vendors, systems and risks - that’s what makes them defensible and useful in practice.
Key Takeaways
- Data breach fines in the UK can be significant, but the ICO’s approach is proportional - strong controls, quick response and cooperation matter as much as the incident itself.
- You must assess every incident quickly and, where required, notify the ICO within 72 hours and affected individuals without undue delay.
- Get your legal foundations in place: a tailored Privacy Policy, processor contracts (a Data Processing Agreement and Data Processing Schedule), any needed Data Sharing Agreement, and a compliant Cookie Policy.
- Technical basics (encryption, MFA, access controls) plus staff training and a tested Data Breach Response Plan drastically reduce both risk and fine exposure.
- Demonstrate accountability: maintain records, meet SAR deadlines, manage retention and deletion, and keep your ICO registration up to date (checking any fee exemptions).
- If you’re unsure where to start, a bundled solution like our GDPR Package gets the core compliance pieces in place quickly and cost-effectively.
If you’d like help reducing your risk of data breach fines or building your privacy compliance toolkit, you can reach us at 08081347754 or team@sprintlaw.co.uk for a free, no-obligations chat.


