Data Breaches
- Overview
- Guidance, Documents & Policies
- Checklist
- Examples of Breaches
- Examples & Advice
- FAQs
- Ask a Question
Need to report a data breach? Use the Breach Log.
This best practice area pulls together all our relevant content on data breaches.
This includes:
- Data Breach Procedure
- e-learning and drip-feed posters
- FAQs
- Links to other relevant best practice
Data breaches should be kept at the forefront of your data protection planning, as they can result in the most disruption and harm.
Why?
The GDPR introduced a duty on all organisations to report certain types of a personal data breach to the relevant supervisory authority (The ICO). This must be done within 72 hours of becoming aware of the breach, where feasible:
- If the breach is likely to result in a high risk of adversely affecting individuals’ rights and freedoms, individuals must also be informed without undue delay;
- Organisations should ensure they have robust breach detection, investigation and internal reporting procedures in place. This will facilitate the decision to notify the ICO and/or the affected individuals;
- Organisations must also keep a record of any personal data breaches, regardless of whether they require notification to the ICO.
Always log your data breaches and get in touch with DPE if you require urgent assistance at
Guidance and procedures
document Data Breach Procedure (5.18 MB)
Also review Information and Cyber Security Best Practice Area
Log a data breach
To report data breaches - use the Breach Log
spreadsheet
Data Breach Assessment Matrix
(5 KB)
Letter templates
document Data Breach Notification Letter to Data Subject (8 KB)
Related Best Practice Areas
Drip-feed posters
Recognising a data breach | Responding to a data breach | |
![]() |
![]() |
e-Learning
Learning nuggets:
External links
Information Commissioner's Office: Personal data breaches
Examples of breaches
- Loss or theft of paper records or loss or theft of equipment on which data is stored, e.g. a laptop, mobile phone, tablet device or memory stick;
- A letter or email containing personal and/or confidential data sent to the wrong address (including internal staff or third parties) or an email to an unauthorised group of email boxes;
- Personal data disclosed orally in error in a meeting or over the phone – including “blogging”, where information is obtained by deceiving The Organisation or where information has been disclosed without confirming the true identity of the requester;
- Unauthorised access to information classified as personal or confidential, e.g. attaching documents to an outlook diary appointment that is openly accessible;
- Posting information on the world wide web or on a computer otherwise accessible from the Internet without proper information security precautions;
- Sensitive information left on a photocopier or on a desk in County Council premises;
- Unauthorised alteration or deletion of information;
- Not storing personal and confidential information securely;
- Not ensuring the proper transfer or destruction of files after the closure of offices/buildings, e.g. not following building decommissioning procedures;
- Failure to safeguard/remove personal data on office equipment (including computers and smartphones) before disposal/sale.
Examples of Breaches caused by IT Security Incidents:
- Unauthorised access to IT systems because of misconfigured and/or inappropriate access controls;
- Hacking or phishing attacks and related suspicious activity;
- Virus or malware attacks and related suspicious activity;
- ICT infrastructure-generated suspicious activity;
- Divulging a password to another user without authority.

HCRG Care Group data breach

ICO: Learning from the mistakes of others report

Why Data Should Stay Put: Benefits of Keeping Data in Its Original System

The Perils of Paper: The Printing Vulnerability

Cyber Attack on a School

The Mother of all Breaches

ClassCharts Possible Data Breach

Where is your data stored?

If you suspect a financial scam .....

The ICO reprimands a Multi Academy Trust

Lettings Best Practice and Guidance

Where's Harry the Hacker?

The ICO Reprimands a school

How to contact us for support, subject access requests, data breaches and FOI's
While all ou...

Secure file transfer of files using Royal Mail
In such cases, the sender remains the data controller and is responsible for ensuring that the optimum d...

Headteacher fined for breach of data protection legislation
A former headteacher has been fined in court for unlawfully obtaining school children’s personal data from previous schools where he worked.

Cyber Security Breaches Survey 2024 (Education Institutions)

Cyber Security Breaches Survey 2024 (Businesses and Charities)

Update on Advisory for Rhysida Ransomware

The Crime in a Cyber Attack and a Data Breach

ICO Reprimand: company suffered a ransomware attack

Email and Security: ICO recent guidance
Emails...

Cyber Attack: Exam Boards

VICE SOCIETY - Ransomware attacks on schools

Cyber Attack: Manchester University

Cyber Attack: Leytonstone School

Be Cyber Aware: Cyber attacks and transparency. A no blame culture

Cyber Security Breaches Survey 2023
The full report is here: Cyber Security Breaches Survey 2023
There is a separat...

January Cyber update - How Can Schools Help Prevent Cyber Attacks?

Emails – good practice and minimising the risk of a data breach
Have a question about data breaches? Ask it here.
Please use this for generic questions about breaches and breach procedures.
To report a data breach - use the Breach Log
To contact use about an urgent or specific query contact us using: