Data Protection and Privacy: UK GDPR Guide for Businesses
UK GDPR imposes legally enforceable obligations on any organisation that processes personal data. This guide covers the core principles, what businesses must do in practice, common compliance mistakes and the technical controls that satisfy Article 32's requirement for appropriate security measures.
Sophie Moore
Operations Manager
UK GDPR: The Fundamentals
The UK General Data Protection Regulation (UK GDPR) — retained and adapted from the EU GDPR following Brexit — sets out how organisations must collect, store, process and protect personal data. It applies to virtually every UK business that handles data about customers, employees, suppliers or any other identifiable individuals.
The Information Commissioner's Office (ICO) enforces UK GDPR and can issue fines of up to £17.5 million or 4% of global annual turnover, whichever is higher, for serious violations. In practice, the ICO focuses enforcement on material harm to data subjects and failures of transparency rather than purely technical non-compliance, but the financial and reputational consequences of a breach remain significant.
The Seven Principles
UK GDPR is built around seven principles that apply to all personal data processing:
- Lawfulness, fairness and transparency: You must have a lawful basis for processing, be honest about how you use data and not use it in ways people would not reasonably expect.
- Purpose limitation: Data collected for one purpose cannot be used for an unrelated purpose later.
- Data minimisation: Only collect the data you genuinely need.
- Accuracy: Keep personal data accurate and up to date.
- Storage limitation: Do not retain personal data longer than necessary for its purpose.
- Integrity and confidentiality: Process data securely, protecting against unauthorised access, loss or destruction — this is the security requirement.
- Accountability: You must be able to demonstrate compliance, not just claim it.
Lawful Bases for Processing
Every act of processing personal data requires a lawful basis. The six bases under UK GDPR are:
- Consent: Freely given, specific, informed and unambiguous. Cannot be bundled with terms and conditions.
- Contract: Processing necessary to fulfil a contract with the data subject.
- Legal obligation: Processing required by law (e.g., payroll for HMRC).
- Vital interests: Rare — for life-or-death situations.
- Public task: Applicable primarily to public authorities.
- Legitimate interests: The most commonly misused basis — processing must be necessary, balanced against the data subject's rights, and a Legitimate Interests Assessment (LIA) should be documented.
Many businesses default to consent as their lawful basis when legitimate interests or contract would be more appropriate and proportionate. Consent-based processing creates ongoing obligations around managing withdrawals that other bases do not.
Article 32: The Security Requirement
Article 32 of UK GDPR requires organisations to implement appropriate technical and organisational measures to ensure security appropriate to the risk. This is intentionally non-prescriptive, but in practice the ICO expects measures proportionate to the sensitivity of the data and the likelihood and severity of potential harm.
Technical measures typically expected include:
- Encryption of personal data at rest and in transit
- Ongoing confidentiality, integrity and availability of processing systems
- The ability to restore access to personal data after an incident
- Regular testing and evaluation of security measures
Organisational measures include staff training, access controls, data processing agreements with suppliers and documented policies.
Data Breach Obligations
Under UK GDPR, a personal data breach that is likely to result in risk to individuals must be reported to the ICO within 72 hours of becoming aware of it. Breaches that are likely to result in high risk to individuals must also be communicated to the affected individuals without undue delay.
Key points businesses often misunderstand:
- A breach is not just hacking — lost laptops, misdirected emails and unauthorised access by employees all qualify
- The 72-hour clock starts when you become aware, not when the breach occurred
- You do not need to have all the facts within 72 hours — a partial notification followed by updates is acceptable
- You should maintain a register of all breaches, even those not reportable to the ICO
Common Compliance Mistakes
Based on ICO enforcement trends and practical experience across UK SMEs, the most frequent compliance failures are:
- No lawful basis documentation: Organisations process data without recording their legal basis or conducting the required assessments.
- Excessive data retention: Data held indefinitely because no one has defined retention periods or created a deletion schedule.
- Third-party processors without contracts: Using cloud services, marketing platforms or payroll providers without Data Processing Agreements (DPAs) in place.
- Inadequate security for the data held: Unencrypted laptops, shared passwords or cloud storage with no access controls protecting databases of customer personal data.
- Privacy notices not updated: A copied privacy notice that does not reflect actual processing activities.
Practical Steps for UK SMEs
Compliance does not require a large compliance department. The following steps cover the majority of what most UK SMEs need to have in place:
- Complete a data mapping exercise — what personal data do you hold, where is it, why, and with whom is it shared?
- Document a lawful basis for each category of processing
- Update your privacy notice to accurately reflect your data processing
- Define and implement retention schedules for each data category
- Put DPAs in place with all processors (cloud providers, marketing tools, payroll, etc.)
- Implement technical security measures appropriate to your risk level — encryption, access controls, MFA
- Train staff on data protection basics and how to identify a potential breach
- Create an incident response procedure that includes the 72-hour ICO notification process
The accountability principle means you should document all of the above. The ICO expects to see evidence of compliance, not just assurances.
Are Your Technical Security Measures GDPR-Appropriate?
Article 32 requires appropriate technical controls for the personal data you process. AMVIA can assess your current security posture against UK GDPR requirements and recommend proportionate improvements.
Frequently Asked Questions
Yes. The UK retained and adapted the EU GDPR into UK law as the UK GDPR, which came into force on 1 January 2021. UK organisations processing personal data of UK residents are subject to UK GDPR, enforced by the ICO. Transfers of personal data between the UK and EU are permitted under an adequacy decision currently in place.
Most UK SMEs are not legally required to appoint a DPO. A DPO is mandatory for public authorities, organisations that carry out large-scale systematic monitoring of individuals, or organisations that process special category data (health, biometric, etc.) on a large scale. However, having a named individual responsible for data protection internally is good practice regardless of size.
A personal data breach is any security incident that leads to accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to personal data. This includes ransomware attacks, lost unencrypted laptops, emails sent to the wrong recipient containing personal data, and accidental deletion of records without backups.
The ICO has issued significant fines including £20 million to British Airways (reduced from a proposed £183 million) following a 2018 data breach, and £18.4 million to Marriott International. For SMEs, fines tend to be lower but enforcement action — including enforcement notices and reprimands — carries reputational cost alongside any financial penalty.
Encryption is one of the specific technical measures cited in UK GDPR as appropriate for protecting personal data. Importantly, if a data breach involves only properly encrypted data, the ICO may determine there is no requirement to notify affected individuals, because the data is not intelligible to an unauthorised party. This makes encryption particularly valuable as a data protection control.
Related Reading
Email Encryption for Business | AMVIA Guide
Why email encryption matters for UK GDPR compliance and how to implement it for your business.
2025 Cybersecurity Compliance Guide | UK & EU Regulatory Landscape
Navigate the full UK and EU cybersecurity regulatory landscape including UK GDPR, NIS2 and Cyber Essentials.
UK Cybersecurity Guide for SMEs | Practical Steps
Practical cybersecurity steps for UK SMEs, many of which directly support UK GDPR technical compliance.