Professional office environment representing data breach incident response
Client Data Breach?

Your 72-hour professional response plan

Compliance Guide
12 min read

Client Data Breach: The UK Professional's 72-Hour Response Plan

A client data breach is every professional's worst nightmare. Whether you are a solicitor, accountant, financial advisor, or recruiter, the clock starts ticking the moment you discover it. You have 72 hours to notify the ICO, and every decision you make in that window determines whether your practice survives.

FileSeal Security Team
Updated March 2026

The 72-Hour Breach Response Timeline

Hours 0-4: Contain
Stop the breach, preserve evidence, assemble your team
Hours 4-24: Assess
Determine scope, identify affected clients, evaluate risk
Hours 24-72: Report
Notify ICO, contact clients, inform your regulator

Critical: Under GDPR Article 33, you must notify the ICO within 72 hours of becoming aware of a qualifying breach. Failure to do so is a separate offence carrying fines of up to 10 million euros.

Secure Your Client Document Collection

The 72-Hour Clock Is Non-Negotiable

The ICO has made clear that the 72-hour notification window begins when you become aware a breach has occurred, not when you finish investigating it. Delaying notification while you "gather more information" is not a valid excuse and can result in a separate fine on top of any penalties for the breach itself. If in doubt, report early and update later.

Hours 0-4: Contain the Breach Immediately

The first four hours are about damage limitation. Your priority is to stop the breach from getting worse while preserving evidence for your investigation and any regulatory proceedings that follow.

Immediate containment actions - do these before anything else:

Stop the Breach
  • Isolate affected systems
  • Revoke compromised credentials
  • Disable breached email accounts
  • Block suspicious IP addresses
Preserve Evidence
  • Do NOT delete anything
  • Screenshot error messages
  • Save server and access logs
  • Record the exact discovery time
Assemble Your Team
  • Senior partner or director
  • IT support or managed service provider
  • Your DPO (if appointed)
  • Cyber insurance provider

Contact Your Cyber Insurance Provider Immediately

If you have cyber insurance, and as a UK professional handling client data you absolutely should, contact your insurer within the first hour. Most policies include incident response services, access to forensic investigators, legal counsel, and PR support. Using their approved providers is often a condition of your policy. Failing to notify promptly could void your coverage at the exact moment you need it most.

Your insurer will typically assign a breach coach, an experienced lawyer who coordinates the entire response. This takes significant pressure off you and ensures every step is documented correctly for regulatory purposes.

Hours 4-24: Assess the Scope and Severity

Once the breach is contained, you must determine exactly what happened, what data was compromised, and who is affected. This assessment drives every decision that follows, from whether you need to notify the ICO to which clients you must contact.

Breach Severity Assessment Framework

Data Types Compromised
  • High risk: Passports, driving licences, NI numbers
  • High risk: Financial records, bank statements
  • High risk: Health records, legal case files
  • Medium risk: Names, addresses, contact details
  • Lower risk: Business information, invoices
Key Questions to Answer
  • How many clients are affected?
  • Was the data encrypted at rest?
  • Was data actually accessed or just exposed?
  • Is there evidence of data exfiltration?
  • How long was the vulnerability open?

ICO notification threshold: You must report to the ICO if the breach is likely to result in a risk to the rights and freedoms of the affected individuals. When dealing with identity documents, financial records, or legal files, this threshold is almost always met.

Document Everything as You Go

Under GDPR Article 33(5), you must maintain a record of all personal data breaches, regardless of whether they meet the ICO notification threshold. Create a breach log from the moment of discovery and record every action taken, every decision made, and every person involved. This is not optional. The ICO will ask for it, and having a thorough, timestamped record demonstrates accountability and can significantly reduce any penalty.

Hours 24-72: Notify the ICO and Affected Clients

ICO notification: what to include in your report

Required Information
  • Nature of the breach and data categories
  • Approximate number of individuals affected
  • Name and contact details of your DPO
  • Description of likely consequences
  • Measures taken to address the breach
How to Report

Client Notification: Getting It Right

Under GDPR Article 34, you must notify affected individuals directly if the breach is likely to result in a high risk to their rights and freedoms. For professionals handling identity documents, financial records, or legal files, this is almost always the case.

Your client notification should be clear, honest, and actionable. Resist the temptation to minimise the breach or use vague language. Clients will respect transparency far more than corporate-speak, and the ICO specifically looks for clear communication when assessing your response.

Client Notification Checklist

What to Include

  • Plain-English description of what happened
  • Exactly what data was compromised
  • What you are doing to fix it
  • Specific steps the client should take
  • A named contact for questions (not a generic inbox)
  • Timeline for further updates

What to Avoid

  • Vague language like "incident" instead of "breach"
  • Minimising the severity or scope
  • Blaming third parties without evidence
  • Promising it will never happen again
  • Delay tactics or drip-feeding information
  • Sending notification by unsecured email

Important: Send breach notifications through a secure channel, not the same email system that may have been compromised.

Secure Your Client Document Collection

Most professional data breaches start with insecure document collection. Email attachments, shared drives, and WeTransfer links create permanent copies of sensitive client data. FileSeal's zero-trust encryption means your server never sees plaintext documents, and automatic deletion after download eliminates the data that breaches exploit.

Regulatory Body Notifications: Who Else You Must Tell

The ICO is not the only body you may need to notify. Most UK regulated professionals have additional reporting obligations to their sector regulator. Failing to notify your regulator can result in separate disciplinary proceedings, even if your ICO response is perfect.

Regulatory Body Notification Requirements

Solicitors
  • SRA (Solicitors Regulation Authority)
  • Report under SRA Principle 2 (public trust)
  • Notify within 10 business days
  • Include remedial actions taken
Accountants
  • ICAEW / ACCA / AAT
  • Report under professional conduct rules
  • Demonstrate compliance procedures
  • Show remediation steps
Financial Advisors
  • FCA (Financial Conduct Authority)
  • Report as a material incident
  • Use the FCA Connect portal
  • Ongoing reporting may be required
Recruiters & Others
  • REC (if a member)
  • Professional indemnity insurer
  • Any industry body you belong to
  • Consider notifying affected employers

Managing the PR and Client Relationship Fallout

A data breach does not just threaten your regulatory standing. It threatens the client relationships you have spent years building. How you communicate during and after a breach will determine whether clients stay or leave. Research consistently shows that organisations which respond transparently and quickly retain significantly more clients than those that delay or minimise.

The First 48 Hours of Communications

Appoint a single spokesperson for all breach communications. Mixed messages from different partners or staff members create confusion and erode trust. Your spokesperson should be senior enough to make decisions and empathetic enough to handle distressed clients. Prepare a Q&A document that covers the most likely questions, and ensure everyone in your practice knows to direct enquiries to the nominated person.

If you have a website or client portal, publish a brief, factual statement. Do not wait for the press to contact you. Controlling the narrative from day one is significantly more effective than reacting to speculation.

Post-Breach: Strengthening Your Defences

A breach is painful, but it is also an opportunity to rebuild your security posture from the ground up. The ICO will look at what you do after the breach as much as what you did before it. Demonstrating genuine improvement can significantly mitigate any penalty.

Post-Breach Security Improvement Plan

Immediate Changes
  • Eliminate email-based document collection
  • Implement zero-trust encrypted file sharing
  • Enable multi-factor authentication everywhere
  • Review and restrict access permissions
  • Encrypt all stored client data at rest
Ongoing Measures
  • Annual staff security awareness training
  • Quarterly penetration testing
  • Regular data retention policy reviews
  • Incident response plan rehearsals
  • Cyber Essentials Plus certification

Key insight: The ICO has stated that demonstrable improvements after a breach are considered a mitigating factor when determining penalties. Investment in better security now can directly reduce your financial exposure.

The Financial Impact of Getting It Wrong

The costs of a data breach extend far beyond ICO fines. For a mid-sized professional practice, the total financial impact typically includes forensic investigation costs, legal fees, regulatory fines, client compensation, increased insurance premiums, and lost business. Studies from the UK Cyber Security Breaches Survey indicate the average cost for a professional services breach now exceeds 15,000 pounds for small firms and significantly more for larger practices.

Potential Penalties and Costs

ICO Fine
Up to 17.5M pounds or 4% of turnover
Late Notification
Separate fine up to 10M euros
Client Claims
Individual compensation claims + legal costs

The good news: A well-executed breach response, including prompt notification, transparent communication, and genuine security improvements, can reduce ICO penalties by up to 40% according to published enforcement decisions.

Prevention Is Better Than Response

The best breach response plan is one you never have to use. Most professional data breaches originate from the same weak points: email attachments containing client documents, shared drives with excessive access permissions, and file sharing services that retain copies indefinitely.

The single most effective change you can make is eliminating email as a document collection channel. When client documents are encrypted before transmission, automatically deleted after download, and never stored in plaintext on your server, you eliminate the data that breaches exploit. Even if an attacker gains access to your systems, there is nothing for them to steal.

This is exactly the approach that professionals across the UK are adopting. Solicitors, accountants, financial advisors, and recruiters are switching to zero-trust document collection because the alternative is the 72-hour nightmare described in this guide.

Prevent the Breach Before It Happens

Stop collecting client documents by email. FileSeal's zero-trust encryption ensures your server never sees plaintext files. Documents are encrypted on the client's device, downloaded once, and automatically deleted. No stored data means no data to breach.

Related Articles

Client Data Breach: The UK Professional's 72-Hour Response Plan | FileSeal