What counts as a marketing data breach in the UK (and why it’s different from a generic IT incident)
In the UK, a marketing data breach is usually any security incident that leads to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to personal data used for marketing. That includes email lists, CRM records, lead forms, preference centres, suppression lists, tracking identifiers, and campaign reports where individuals can be identified.
What makes it “marketing” is not the technology involved, but the purpose and the data flows: who you’re contacting, how consent or opt-out status is stored, and which partners (email service providers, ad platforms, agencies) can see or use the data. A generic IT incident (like a server outage or malware on a device) becomes a marketing data breach when personal data for promotional activity is exposed, copied, sent to the wrong recipient, or accessed by someone who shouldn’t have it.
Common examples include: sending a campaign to the wrong segment; exposing recipients in the “To” field; a compromised ESP login; exporting a list to an unapproved tool; sharing hashed emails or customer IDs with an ad platform against your settings; or losing a spreadsheet of leads. Even if the content is “just” email addresses, it can still be personal data, and the impact can be higher if it reveals sensitive inferences (for example, health-related interests from a mailing list name).
Because marketing relies on third parties and rapid distribution, the notification process often starts with pausing campaigns, preserving logs, and checking whether consent/opt-out data was affected. If there’s a risk to people’s rights and freedoms, organisations may need to report to the ICO within 72 hours and, in higher-risk cases, inform affected individuals.
Step-by-step: triage, assess risk, and decide whether to notify the ICO within 72 hours
1) Triage fast (first hour). Confirm what happened, when you became aware, and whether the incident is ongoing. Isolate affected systems (e.g., pause the campaign tool, revoke API keys, reset compromised accounts) and preserve evidence (logs, emails, screenshots). Start an incident record with timestamps and named owners.
2) Identify the data and scope. List what marketing data may be involved: email addresses, phone numbers, names, postal addresses, customer IDs, preferences/segmentation, tracking IDs, and any special category data (e.g., health-related interests). Estimate volume and whether data was encrypted, pseudonymised, or otherwise protected.
3) Determine the breach type. Classify as confidentiality (unauthorised access/disclosure), integrity (alteration), availability (loss), or a mix. Note whether it’s a processor issue (e.g., ESP) or internal, and whether third parties received the data.
4) Assess risk to individuals. Consider likely harms: phishing, identity fraud, account takeover, embarrassment, discrimination, or loss of control over personal data. Factor in vulnerability (children, at-risk groups), ease of identification, and whether contact details enable targeted scams.
5) Decide on ICO notification. If the breach is likely to result in a risk to individuals’ rights and freedoms, plan to notify the ICO within 72 hours of awareness. If you decide not to notify, document your reasoning and supporting facts.
6) Prepare the essentials for reporting. Capture: nature of the breach, categories/approximate number of individuals and records, contact point (DPO/lead), likely consequences, and measures taken or proposed to address it and reduce harm.
Notification routes compared: ICO vs affected individuals vs customers/partners (and what to include in each message)
ICO (regulator) is the route for reporting a personal data breach where there’s a likely risk to people’s rights and freedoms. The message should be factual and structured: what happened (type of incident), when you became aware, categories and approximate volume of personal data involved, number of people affected (best estimate), likely consequences, and what you’ve done to contain it. Include a clear contact point (DPO or responsible lead) and any planned follow-up updates. Avoid speculation; explain what you know and what you’re still investigating.
Affected individuals should be notified when the risk is high. The focus is practical impact and actions they can take. Use plain English: what happened, what data of theirs may be involved (e.g., email address, marketing preferences, purchase history), what the realistic risks are (phishing, account takeover), and specific steps (reset passwords, be alert to scam emails, contact your support team). Provide a dedicated help channel, expected timelines, and how you’ll communicate future updates. Don’t include unnecessary technical detail or other people’s information.
Customers/partners (B2B stakeholders) may need notice even if they’re not directly affected, especially where service continuity, shared systems, or contractual reporting is relevant. Keep it operational: whether their data or campaigns are impacted, any changes to integrations/API keys, recommended security checks on their side, and whether marketing sends are paused. Include a brief incident summary, containment steps, and a single point of contact for coordination.
FAQ: common UK marketing breach scenarios (mis-sent emails, exposed lists, CRM access, tracking pixels, processors)
Q: I sent a campaign to the wrong list. Is that a breach?
Potentially. If recipients can see others’ details (for example, CC instead of BCC) or the content reveals sensitive information, treat it as a personal data incident. Record what happened, stop further sends, and assess risk to individuals.
Q: An email exposed our subscriber list (names/emails). What should we do first?
Contain it: recall where possible, ask unintended recipients to delete, disable links, and preserve evidence (send logs, list version, timestamps). Then assess whether it’s likely to risk people’s rights and freedoms; if so, consider reporting to the ICO within 72 hours and notifying affected people.
Q: A former employee still has CRM access. Is that notifiable?
Unauthorised access is a security incident even if no data was exported. Remove access immediately, review audit logs, reset credentials/tokens, and document findings. Notification depends on the likelihood of harm (for example, misuse of contact data).
Q: Are tracking pixels a “breach” if consent wasn’t set correctly?
That’s usually a compliance issue rather than a security breach. Still, pause the tag, fix consent settings, check what data was collected, and document remediation. If personal data was disclosed to third parties unexpectedly, reassess breach reporting.
Q: Our email/SMS provider (processor) had an incident. Who reports?
Processors should inform you without undue delay. As the controller, you typically decide whether to notify the ICO and individuals. Get a clear incident report, scope affected UK contacts, and confirm containment steps.