Alex is Sprintlaw’s co-founder and principal lawyer. Alex previously worked at a top-tier firm as a lawyer specialising in technology and media contracts, and founded a digital agency which he sold in 2015.
Confidentiality issues have a habit of surfacing at the worst possible time - during a staff exit, a supplier dispute, a customer complaint, or right when you’re scaling up and sharing more sensitive information than ever.
If you’re running a small business, you might be wondering what happens if confidentiality is breached - and what you’re actually meant to do next.
The good news is that you usually have options. But the right next step depends on what was disclosed, who disclosed it, how it happened, and whether the breach involves personal data (which can trigger UK GDPR obligations) or “business confidential information” (which is usually handled through contract and common law).
Below, we’ll walk through the real-world legal risks for UK businesses and a practical action plan to help you respond quickly, limit damage, and protect your business going forward.
What Counts As A Confidentiality Breach In A UK Business?
In plain terms, a confidentiality breach is when someone discloses, uses, or shares information that should have been kept confidential - without proper authority.
For small businesses, “confidential information” commonly includes:
- Customer lists and pricing (including margins, discounts, and preferred supplier rates)
- Trade secrets (recipes, formulas, source code, manufacturing methods, unique processes)
- Commercial strategy (business plans, go-to-market strategy, tender information)
- Financial data (bank details, forecasts, management accounts, funding information)
- Employee information (salaries, disciplinary history, health information)
- Client deliverables (design files, training materials, internal documentation)
A breach can happen in a lot of everyday ways, for example:
- Sending an email to the wrong recipient
- Posting internal screenshots in a group chat
- Sharing private messages externally (even if “it’s just to prove a point”)
- Taking files when leaving the business
- Uploading confidential documents to an insecure platform
- Discussing client matters in public or on social media
Two important clarifications:
- Confidentiality breaches aren’t only about employees. Contractors, consultants, suppliers, partners, and even customers can be bound by confidentiality obligations depending on your contracts.
- Confidential information isn’t always “labelled confidential”. If the information is obviously sensitive and you’ve treated it as confidential, you may still be able to protect it.
If you’re tightening up your internal controls, having clear written rules helps a lot - especially when you need to show you took confidentiality seriously. This is where Workplace Confidentiality Policies can make a real difference in day-to-day operations and in disputes.
What Laws Apply If Confidentiality Is Breached?
When business owners ask what happens if confidentiality is breached, they’re often really asking: what legal rights do we have, and what trouble could we be in?
In the UK, confidentiality breaches commonly fall into one (or more) of these legal buckets.
1) Breach Of Contract
If you have a confidentiality clause in an employment contract, contractor agreement, supplier agreement, or settlement agreement, a breach may be a straightforward breach of contract.
That contract can give you stronger enforcement options, such as:
- requiring return/destruction of documents
- restricting use or disclosure
- setting out post-termination confidentiality obligations
- sometimes, specifying remedies (although “penalty” clauses can be unenforceable)
Having the right wording in your Employment Contract is often the difference between “we’re stuck” and “we can act quickly”.
2) Common Law Breach Of Confidence
Even if you don’t have a perfect contract clause, UK common law can protect confidential information where:
- the information has the “necessary quality of confidence”
- it was shared in circumstances importing an obligation of confidence, and
- it was used or disclosed without authorisation
In practice, the court will also look at factors like whether disclosure or misuse was unfair, and what harm or risk of harm it has caused or is likely to cause. This is especially relevant for trade secrets and sensitive business know-how.
3) Trade Secrets Protections
The UK also has specific protection for trade secrets through the Trade Secrets (Enforcement, etc.) Regulations 2018. This can help if what was taken/shared is genuinely a trade secret (not just general skill or knowledge).
4) Data Protection Law (UK GDPR And The Data Protection Act 2018)
If the breach involves personal data (for example, customer contact details, staff HR files, salary data, health information, or identifiable CCTV footage), then it may be a personal data breach under UK GDPR.
That’s when the risk profile changes, because you may have legal duties to:
- assess risk to individuals
- notify the ICO without undue delay (and where feasible, within 72 hours) if the breach is likely to result in a risk to individuals’ rights and freedoms
- notify affected individuals without undue delay if the breach is likely to result in a high risk
- keep internal records of the incident
Even if you don’t notify the ICO, you should still document your decision-making. Good data governance (including retention and deletion) can reduce the impact of a breach - data retention periods are a surprisingly common weak spot for growing businesses.
What Are The Real Legal Risks For Your Business If Confidentiality Is Breached?
The consequences of a confidentiality breach depend on whether you are the party whose information was leaked, or whether your business is the one responsible for an internal leak of someone else’s information (for example, a customer data breach).
In practice, small businesses can face a combination of legal, financial, operational, and reputational risks.
If Your Business Is The “Victim” Of The Breach
If someone leaks your business information, the common risks include:
- Loss of competitive advantage (a competitor gets your pricing, marketing plan, or supplier rates)
- Lost sales or clients (client poaching after an employee departure is a classic scenario)
- Delay in fundraising or deals (investors can walk away if confidentiality isn’t controlled)
- IP dilution (trade secrets lose value once they’re public)
- Disputes and legal costs (especially if you need urgent court action)
Businesses often underestimate how quickly a breach can spiral, particularly when screenshots or files circulate across multiple people and platforms. This is why the legal risks of sharing private messages is a recurring issue in workplace and commercial disputes - “it was just a screenshot” can still create very real liability.
If Your Business Is Responsible For The Breach (Including Staff Mistakes)
If your employee or contractor leaks confidential client or employee information, your business could face:
- UK GDPR regulatory risk (including potential ICO investigation and enforcement)
- Contractual claims from clients (if your contract includes confidentiality/data security obligations)
- Negligence allegations (if you failed to take reasonable security steps)
- Reputational damage (lost trust can be more expensive than any fine)
- Operational disruption (incident response, customer support, system lockdowns)
Even where an employee acted “by accident”, you can still have exposure - and separately you may need to manage the employment relationship. Confidentiality mistakes are a common trigger for disciplinary processes, particularly if the disclosure was careless or avoidable. In more serious cases, it can even result in dismissal, which is why it’s worth understanding the risks around accidentally sending confidential information before you rush into action.
What Should You Do Immediately After A Confidentiality Breach? (A Practical Action Plan)
When a breach happens, speed matters - but so does staying calm and gathering facts.
Here’s a practical step-by-step approach most small businesses can follow.
1) Contain The Breach (Stop The Spread)
Your first priority is to reduce ongoing damage. Depending on what happened, containment might include:
- disabling access to accounts, folders, or shared drives
- changing passwords and enabling MFA
- recalling emails (where possible) and requesting deletion
- issuing a written instruction to stop using/sharing the information
- recovering devices (laptops/phones) if it’s an exit scenario
If the breach involves a former employee or contractor, you may also need a formal letter requiring immediate return/destruction of confidential material.
2) Document Exactly What Happened
Make a written incident record while facts are fresh:
- what information was disclosed (be specific)
- who disclosed it and who received it
- when and how it happened (email, messaging app, USB, cloud link)
- whether any files were downloaded/copied
- what steps you’ve already taken to contain it
This is important for:
- your legal strategy
- any insurer notification
- any ICO notification (if personal data is involved)
- showing you acted promptly and responsibly
3) Check Your Contracts And Policies
Before you accuse anyone of wrongdoing, check what documents actually apply:
- employment contracts and confidentiality clauses
- any NDA signed during onboarding, negotiations, or projects
- contractor or supplier agreements
- client terms (your confidentiality promises to them)
- internal policies and IT acceptable use rules
If you rely heavily on secrecy (for example, agencies, SaaS businesses, product companies, professional services), it’s often worth having a dedicated Non-Disclosure Agreement for sensitive disclosures, rather than hoping a short clause in a broader contract will do the job.
4) Assess Whether It’s A Personal Data Breach (UK GDPR)
Ask: does this involve information that identifies a person?
If yes, you should assess the likelihood and severity of risk to the individual(s), including risks of:
- identity theft or fraud
- financial loss
- confidentiality harms (health data, HR issues)
- distress or reputational damage
If the breach is likely to result in a risk to people’s rights and freedoms, you may need to notify the ICO without undue delay (and where feasible, within 72 hours). If it’s likely to result in a high risk to individuals, you may also need to notify affected people without undue delay.
Even if you don’t notify, you should keep records of your decision-making and actions taken.
5) Consider Your Employment/Contractor Management Steps
If the breach involves someone working for you, you’ll usually need to manage two tracks at once:
- Risk management: stop the breach and protect the business
- People process: handle conduct fairly and consistently
That might mean:
- suspending access (and in some cases suspending the employee) while you investigate
- conducting a fact-finding meeting
- starting a disciplinary process if appropriate
- issuing a warning, additional training, or (for serious cases) considering dismissal
Be careful not to skip process, especially where dismissal is a possibility. A rushed response can create a second legal problem (an unfair dismissal claim) on top of the confidentiality breach.
6) Get Legal Advice Early (Especially If You Need Urgent Action)
If confidential information has gone to a competitor, been posted online, or is being used to target your clients, you may need urgent legal steps such as:
- a cease and desist letter
- negotiating undertakings (promises to stop using/disclosing and to delete/return materials)
- injunction proceedings (court orders to stop use/disclosure)
- claims for damages/account of profits (depending on the case)
Early advice matters because timing, evidence, and how you communicate can all affect your leverage - and your ability to get quick remedies.
How Can You Recover Losses Or Enforce Your Rights After A Breach?
Once the immediate fire is under control, the next question is usually: can we actually do anything about it?
The answer depends on what you can prove, and what outcome you want.
Common Legal Remedies For Businesses
- Written undertakings from the breaching party (stop, delete, return, don’t repeat)
- Injunctions (particularly where confidential info is still being used or is about to be published)
- Damages (compensation for loss caused by the breach)
- Delivery up (return of documents/devices, or destruction of copies)
- Termination rights (ending a contract for breach, if the contract allows)
In many small business cases, the most commercially sensible result is to secure undertakings quickly, then negotiate settlement terms if there’s clear harm.
Evidence You’ll Usually Need
Confidentiality disputes often come down to evidence. Useful evidence can include:
- emails and message threads showing disclosure
- access logs and download history (where available)
- copies of the relevant contract clauses/policies
- proof the information was confidential (labels, restricted access, internal processes)
- proof of loss (lost clients, reduced sales, price undercutting)
One common mistake is accidentally escalating the situation by doing “informal investigations” that cross privacy boundaries. If you’re checking devices, emails, logs, or CCTV, make sure you’re doing it in a compliant way.
How Do You Prevent Future Confidentiality Breaches In Your Business?
Most confidentiality problems aren’t caused by “bad people”. They’re caused by unclear expectations, weak processes, and businesses moving fast without tightening controls as they grow.
Some practical prevention steps include:
1) Use Clear Contracts And NDAs
Every business is different, but at a minimum you’ll usually want:
- strong confidentiality clauses in employment and contractor agreements
- NDAs for sensitive negotiations, product development, or collaborations
- confidentiality and data protection terms in client/supplier contracts
2) Implement Practical Access Controls
- restrict access to “need-to-know” folders
- remove access immediately on termination
- separate admin accounts from day-to-day user accounts
- use MFA and device management where possible
3) Train Your Team (And Repeat It)
A quick onboarding slide deck isn’t enough. Consider regular refreshers on:
- what confidential information looks like in your business
- how to handle customer and HR data
- what to do if someone sends something to the wrong person
- how to report incidents without fear (early reporting reduces damage)
4) Create A Clear Exit Process
Many breaches happen during resignations and offboarding. Tighten your process:
- confirm return of devices and documents
- disable accounts quickly
- remind departing staff of ongoing obligations in writing
- review client communication access and ownership
5) Have An Incident Response Plan
You don’t need a “big corporate” plan - just a clear internal process so your team knows:
- who to notify internally
- how to contain and record incidents
- when to escalate to legal advice
- when to consider ICO notification
If you’re operating in a privacy-heavy environment, having the right compliance documents in place can also reduce confusion and risk when things go wrong - a tailored Privacy Policy helps set expectations and supports your broader compliance story.
Key Takeaways
- What happens if confidentiality is breached depends on whether the information is business confidential, personal data, or both - and different legal obligations can apply at the same time.
- Confidentiality breaches can trigger breach of contract claims, common law breach of confidence issues, trade secrets protections, and UK GDPR duties if personal data is involved.
- Your first steps should be to contain the breach, document what happened, and check your contracts and policies so you respond based on facts, not assumptions.
- If personal data is involved, you may need to consider ICO notification (generally without undue delay, and where feasible within 72 hours) and whether affected individuals must be informed.
- Legal remedies can include undertakings, injunctions, damages, and return/destruction of materials - but acting quickly and preserving evidence is key.
- The best prevention is a combination of well-drafted contracts/NDAs, access controls, staff training, and a practical incident response plan.
Disclaimer: This article is for general information only and doesn’t constitute legal advice. If you need advice on your specific situation, it’s best to speak with a solicitor.
If you’d like help responding to a confidentiality breach (or tightening your contracts and policies so you’re protected from day one), you can reach us at 08081347754 or team@sprintlaw.co.uk for a free, no-obligations chat.


