Orangeit

Information Security Laws in the UK

In an increasingly digital world, cybersecurity is a key concern for individuals, businesses, and governments. As cyber threats grow in scale and complexity—ranging from data breaches to ransomware attacks—UK legislation has evolved to address these risks.

The UK’s legal framework for cybersecurity includes the Data Protection Act 2018, the Computer Misuse Act 1990, and the Network and Information Systems Regulations 2018. These laws protect data, prevent cybercrime, and regulate businesses handling sensitive information. With cyber threats posing ever-greater risks, understanding the UK’s cybersecurity laws is essential for ensuring digital resilience.

Minster Cyber Security Image 1

Cyber Security Laws & Regulations UK

The Data Protection Act 2018 (DPA), is an integral part of the UK's data protection framework. This act requires organisations, including businesses and government departments, to inform customers about their data-handling practices. DPA offers new ways for customers to have more control over their data, like being able to access and delete their data.

According to the Government website, anyone responsible for using personal data must make sure the information is:

  • "used fairly, lawfully and transparently
  • used for specified, explicit purposes
  • used in a way that is adequate, relevant and limited to only what is necessary
  • accurate and, where necessary, kept up-to-date
  • kept for no longer than is necessary
  • handled in a way that ensures appropriate security, including protection against unlawful or unauthorised processing, access, loss, destruction or damage"

Penalties of Non-Compliance

Data Protection Act 2018 (DPA) & UK General Data Protection Regulation (UK-GDPR)

  • Fines: Up to £17.5 million or 4% of annual global turnover, whichever is higher.
  • Additional Consequences: Enforcement notices, orders to stop processing data, and reputational damage.
  • Example: Companies like British Airways and Marriott have faced multi-million-pound fines for data breaches.

Digital Operational Resilience Act (DORA) (EU)

  • Fines: Potential penalties based on non-compliance severity, proportional to financial institutions’ size and impact.
  • Additional Consequences: Regulatory investigations, operational restrictions, and increased oversight.
  • Relevance: Targets financial services, ensuring banks, insurers, and fintech firms maintain digital resilience.

Network and Information Security Directive (NIS2) (EU)

  • Fines: Up to €10 million or 2% of annual global turnover for critical service providers. Important organisations can be fined up to €7 million or 1.4% of global turnover.
  • Additional Consequences: Temporary bans from operating, strict compliance orders.
  • Relevance: Applies to critical infrastructure sectors like energy, healthcare, and finance.

UK Operational Resilience Framework

  • Fines: Regulatory bodies like the FCA (Financial Conduct Authority) and PRA (Prudential Regulation Authority) impose fines, potentially millions of pounds, for failing to ensure operational resilience.
  • Additional Consequences: Restrictions on business operations and reputational damage.
  • Relevance: Affects banks, insurance firms, and financial institutions handling critical services.

EU Cybersecurity Act

  • Fines: Businesses failing to comply with cybersecurity certification requirements may face sanctions from EU regulatory bodies.
  • Additional Consequences: Loss of product certification, restrictions on selling uncertified products in the EU market.
  • Relevance: Critical for companies producing ICT products and cloud services.

EU Cyber Resilience Act (CRA)

  • Fines: Up to €15 million or 2.5% of annual global turnover for failing to meet cybersecurity requirements.
  • Additional Consequences: Products may be banned from the EU market, with mandatory recalls for non-compliant hardware/software.
  • Relevance: Affects manufacturers, retailers, and developers of digital products and services.

Computer Misuse Act 1990 (UK)

  • Fines & Sentences:
    • Unauthorised access to computer material – Up to 2 years in prison and/or an unlimited fine.
    • Unauthorised access with intent to commit further offences – Up to 5 years in prison.
    • Unauthorised acts causing damage (e.g., malware, hacking) – Up to 10 years in prison.
    • Serious threats to national security or life – Potential life imprisonment.

EU Artificial Intelligence Act

  • Fines:
    • Unacceptable risk AI (e.g., social scoring, biometric surveillance) – Up to €35 million or 7% of annual turnover.
    • High-risk AI non-compliance – Up to €15 million or 3% of annual turnover.
    • Other violations – Up to €7.5 million or 1.5% of turnover.
  • Additional Consequences: Product bans, forced market withdrawal, and reputational damage.

Telecommunications (Security) Act 2021 (UK)

  • Fines:
    • Up to £100,000 per day for continuous non-compliance.
    • Maximum fines of £10 million for serious breaches.
  • Additional Consequences: Government intervention, and restrictions on telecom operations.
  • Relevance: Affects network operators, broadband providers, and mobile companies.

Privacy and Electronic Communications Regulations (PECR) (UK)

  • Fines: Up to £500,000 for serious breaches (e.g., sending unsolicited marketing communications).
  • Additional Consequences: Enforcement actions, bans on marketing activities, and legal action from affected individuals.
  • Example: British Airways and Marriott were fined for PECR and GDPR violations related to data misuse.

Reporting Cybercrime in the UK

In the UK, there are several ways to report cyber security breaches and incidents depending on their severity, such as:

Contact the ICO Within 72 Hours of Identifying Personal Data Breaches

The UK GDPR enforces a duty upon all organisations to report certain personal data breaches to the relevant supervisory authority within 72 hours of an identified threat or breach.

The ICO states that all organisations should be prepared for personal data breaches and should know how to do the following:

  • Recognise a personal data breach
  • Understand that a data breach isn't only about the loss or theft of personal data.
  • Appoint a dedicated person or team who has the responsibility to manage breaches.
  • Provide the correct training to staff on how to identify and escalate a personal data breach to the dedicated team member/members.

Submit a Report to the National Cyber Security Centre

Reporting a cyber incident to the National Cyber Security Centre consists of six sections and takes approximately 15 minutes.

  1. Report Details
  2. Organisation Details
  3. Incident Basics
  4. Incident Impact
  5. Attack Identifiers
  6. Attack Specific Questions

The information you submit is handled carefully and is protected by the NCSC. It is treated as confidential with strict limited access. Your details will be shared with law enforcement partners such as the National Crime Agency as they will help investigate your report.

Contact Emergency Services

Companies or individuals should call 999 if the cyber breach or attack will cause: harm, serious injury or serious damage to a property alongside endangering a person's life.

information security law image with a corporate person pointing to scales

Our Cyber Essentials Service

Our Cyber Essentials Certification is a key component of the UK government’s National Cyber Security Strategy, designed to help businesses enhance their cybersecurity and demonstrate a commitment to protecting against common online threats.

This certification focuses on five critical areas:

  • Firewall Protection: Ensuring all internet-connected devices have properly configured firewalls to prevent unauthorised access and cyber intrusions.
  • Secure Configuration: Implementing secure settings for hardware and software to reduce vulnerabilities and strengthen defence against potential attacks.
  • User Access Control: Restricting access to systems and data, ensuring only authorised users have the necessary permissions.
  • Malware Protection: Deploying security measures such as antivirus software and regular updates to safeguard against malicious software.
  • Patch Management: Keeping software and systems updated with the latest security patches to address known vulnerabilities and maintain a secure environment.

Cyber Essentials Course Structure:

Our Cyber Essentials Course covers the following:

Vulnerability assessments and penetration testing

Teaching you how to identify and address weaknesses in your systems and network before cybercriminals can exploit them.

Best practice reports

You will receive in-depth insights on potential security risks and recommended measures to enhance your organisation’s cybersecurity.

By obtaining Cyber Essentials Certification, businesses can enhance their cybersecurity posture, protect sensitive data, and build trust with customers and stakeholders.

Cyber Essentials Certification support and workshops

A chance to engage in hands-on training with our accredited experts to prepare for your final assessment.

Cybersecurity awareness training

The opportunity to gain essential knowledge to strengthen your business’s defences against cyber threats.

IMG 8291

Cyber Essentials Plus & Other Valuable Services

While our Cyber Essentials course is a beneficial and popular service for UK businesses, there are limitations. For this reason, we also recommend our Cyber Essentials Plus service which involves a more rigorous assessment process. This service includes vulnerability testing and onsite audits which offer businesses a higher level of assurance.

We also provide both consultancy and training for clients who seek more in-depth knowledge regarding cyber security.

Undertaking these training opportunities will equip you with the skills and knowledge to protect your business. Contact us today for more information.

FAQs for Information Security Laws UK

Yes, under certain conditions, the EU and UK GDPR applies to companies that are not in these regions. EU and UK GDPR are designed to protect data belonging to EU and UK citizens and residents. For example, a business from the USA selling or promoting goods to the UK will be subject to UK GDPR, as it would in the EU and EU GDPR.

As the UK left the EU in 2020, we (the UK) have our own GDPR laws that incorporate some aspects of the EU GDPR whilst sitting alongside the DPA (2018).

Related Articles

3D graphic showing endpoints in a EDR vs MDR network

MDR vs EDR: Which is Best for Your Company?

Screen showing code asking what is antimalware software

What is Anti-Malware Software & What Does It Do?

hacker-gbb94edba6_1920

Revolutionising IT Security: The Transition from Traditional AV to EDR and the Future of MDR

Speak to the experts
that put your business first