Cyber Security & Data Breaches: Legal Tips To Protect Your Business (2026 Updated)

Rowan Gardoce
byRowan Gardoce9 min read

Cyber security isn’t just an “IT issue” anymore. If you run a business in New Zealand, it’s also a legal, commercial and reputational issue - because the moment you collect customer or employee information, you’re responsible for how it’s handled.

And with more businesses using cloud tools, remote work, online payments and outsourced providers than ever, a single mistake (like a phishing email or misconfigured storage folder) can quickly become a full-scale data breach.

This guide is updated to reflect current expectations around privacy compliance and breach response in New Zealand, so you can build strong legal foundations and reduce risk from day one.

What Counts As A Data Breach (And Why It Matters Legally)?

In plain terms, a data breach happens when personal information is accessed, used, changed, lost, or shared without permission - whether that’s caused by an outside hacker, an internal mistake, or a supplier you rely on.

In New Zealand, your main legal framework is the Privacy Act 2020. That law doesn’t require you to be “perfect” at cyber security, but it does expect you to take reasonable steps to protect personal information and to act quickly and transparently if something goes wrong.

Here are common examples of breaches we see affecting SMEs:

  • Phishing and invoice fraud where staff are tricked into paying the wrong account or sharing logins.
  • Ransomware locking business systems and customer files until a payment is demanded.
  • Email misdirection (sending a spreadsheet to the wrong recipient).
  • Lost or stolen devices where customer data is stored locally without encryption.
  • Supplier breaches where your payroll, booking, CRM or IT provider is compromised.

Even if the breach wasn’t “your fault” in a technical sense, you can still be responsible from a privacy compliance perspective, because you’re the organisation that collected the data and decided how it would be stored and used.

If you’re thinking, “We’re too small to be a target,” it’s worth re-framing it: small businesses are often targeted because they’re smaller - attackers assume there are fewer controls and less training in place.

Most businesses will interact with the Privacy Act 2020 through three practical obligations:

1) Collect, Use And Store Data Properly

You generally need to make sure you only collect personal information that you actually need, you’re transparent about why you’re collecting it, and you keep it secure.

This is where a clear Privacy Policy can do a lot of heavy lifting - it sets expectations with customers (and staff), and it helps you prove you’re taking compliance seriously.

If you collect data through a website, booking platform, mailing list, loyalty program, online checkout, or app, you should also think about:

  • what personal information you collect (names, email addresses, delivery addresses, health info, payment details);
  • where it’s stored (and whether storage is offshore);
  • who has access internally (and whether access is role-based); and
  • how long you keep it (and when you delete it).

2) Keep Personal Information Secure

The Privacy Act expects “reasonable” security safeguards. What’s reasonable depends on your business size, the sensitivity of the data, and the harm that could occur if it’s exposed.

For example, if you run an online retail store collecting names and delivery addresses, you’ll still want sensible protections. But if you run a health practice, childcare business, or store customer ID documents, the bar is higher because the data is more sensitive.

3) Respond Appropriately When Something Goes Wrong

Having a breach response process is part of privacy compliance. It doesn’t need to be a 40-page manual, but you should have a plan that your team can actually follow at 8pm on a Friday if a staff member receives a ransomware message.

A practical starting point is a Data Breach Response Plan that sets out roles, steps, communication templates, and decision-making pathways.

And if a breach causes (or is likely to cause) serious harm to individuals, you may have to report it - which leads us to the next section.

When Do You Need To Notify The Privacy Commissioner And Affected People?

New Zealand has mandatory notification rules for certain breaches. You’re generally required to notify the Office of the Privacy Commissioner (and affected individuals) when the breach has caused, or is likely to cause, serious harm.

“Serious harm” isn’t just financial loss - it can include emotional distress, safety risks, identity theft risk, or reputational damage for the individuals involved.

It helps to think about factors like:

  • What type of information was involved? (e.g. passport numbers, health information, passwords, bank details)
  • How many people were affected?
  • Who got access? Was it a trusted recipient who deleted it, or a malicious actor?
  • Was the information encrypted or protected?
  • What could someone do with the information?

Timing matters too. A slow, disorganised response can cause more damage than the breach itself - not just commercially, but legally.

That said, you also don’t want to rush out inaccurate information. The goal is to move quickly, preserve evidence, contain the breach, assess seriousness, and notify in a clear and responsible way.

If you’re not sure whether notification is required, that’s a good sign you should get advice early - because the “serious harm” assessment is very fact-specific.

How Do Contracts And Policies Reduce Your Cyber Risk (And Your Liability)?

Cyber security is partly technical, but a big chunk of your risk is actually contractual. Many data breaches get worse because the business didn’t have clear obligations with staff or service providers, or because the business couldn’t quickly control communications when the incident happened.

Make Sure Your Staff Rules Match Your Actual Cyber Risks

Your employees are often your first line of defence - and also (unintentionally) the most common entry point for cyber incidents.

A few “from day one” foundations that help:

  • Confidentiality obligations in your Employment Contract.
  • Clear rules about password management, device use, remote access, and reporting suspicious emails.
  • Privacy and surveillance boundaries if you monitor systems (more on this below).

If you use contractors (like outsourced IT support, marketing contractors, or overseas virtual assistants), you should also consider a proper Non-Disclosure Agreement or confidentiality terms, especially where they can access customer lists, credentials, internal pricing, or operational systems.

Lock In Cyber And Privacy Obligations With Suppliers

Many SMEs rely on third parties for key systems - payroll, rostering, booking platforms, cloud storage, accounting, email hosting, point-of-sale providers, CRM tools and website plugins.

That’s normal. But it also means your legal risk is only as strong as your contracts with those providers.

When reviewing or negotiating supplier terms, pay attention to:

  • Data handling clauses: what security standards do they follow, and where is data stored?
  • Breach notification obligations: do they have to tell you quickly, and how?
  • Liability limits: is their liability capped in a way that leaves you exposed?
  • Subcontractors: can they pass your data to others, including offshore?
  • Access controls: who at the supplier can access your account and why?

If your business provides services to clients (especially B2B), your own customer-facing contract can also help you manage expectations about system availability and security responsibilities - for example through a well-drafted Service Agreement that reflects how you actually deliver the work.

It’s common for businesses to use CCTV, access logs, email security tools, and call recording as part of fraud prevention and cyber security. But you need to balance security with privacy.

The key idea is: even if you have a legitimate reason to monitor, you should still do it transparently and proportionately.

CCTV And Workplace Monitoring

Security cameras can be lawful, but you should have a clear reason for them (like preventing theft, protecting staff, or securing sensitive areas) and you should avoid placing cameras in areas where people reasonably expect privacy (like bathrooms or changing rooms).

Workplace monitoring can also trigger employment and privacy risks, so it’s important to get the approach right. If you’re considering cameras or other monitoring tools, the practical starting point is understanding whether cameras are legal in the workplace and how to implement them fairly.

Call Recording

Call recording can help with training, dispute resolution and fraud prevention - but it’s also sensitive because it can capture personal information.

If you record calls with customers, staff, or suppliers, you should be clear about:

  • what you record and why;
  • how you notify people (e.g. pre-recorded message or verbal notice);
  • who can access recordings;
  • how long you keep them; and
  • how you respond to access requests.

This area can be nuanced, so it’s worth checking your approach against New Zealand’s call recording laws and your broader privacy obligations.

Step-By-Step: What To Do If Your Business Has A Data Breach

If you ever face a suspected breach, it’s easy to panic - but a structured response makes a huge difference. Here’s a practical checklist that aligns with privacy expectations and good risk management.

Step 1: Contain The Breach Immediately

  • Disable compromised accounts, reset passwords, revoke access tokens.
  • Isolate affected devices or servers (especially with ransomware).
  • Stop unauthorised transfers or payments (contact your bank early).

Step 2: Preserve Evidence

  • Take screenshots, preserve logs, save emails and metadata.
  • Don’t wipe devices until you’ve taken advice (you may destroy evidence you need later).

Step 3: Assess What Happened And What Data Was Involved

You’ll want to quickly work out:

  • what system was affected;
  • what personal information was involved;
  • how many individuals are impacted; and
  • whether the data is likely to be misused.

Step 4: Decide Whether Notification Is Required

This is where the “serious harm” test becomes important. If notification is required, you’ll usually need to notify both the Privacy Commissioner and affected individuals.

Even when notification isn’t legally required, you might still choose to notify for customer trust reasons - but it should be done carefully and consistently.

Step 5: Communicate Carefully (Internally And Externally)

In a breach, communication can create legal risk if it’s inaccurate, incomplete, or contradicts your contracts and policies.

A few practical tips:

  • Nominate one person to manage external communications.
  • Keep internal updates factual and need-to-know.
  • Be careful not to blame individuals without evidence (especially employees).

Step 6: Fix The Root Cause And Prevent A Repeat

Once the immediate incident is controlled, you should address the underlying cause:

  • patch vulnerabilities, remove unapproved plugins, update systems;
  • review admin access and implement multi-factor authentication;
  • re-train staff on phishing and data handling; and
  • update your policies, contracts, and vendor management process.

This is also a good time to review your overall privacy compliance (including website notices and internal data practices). If you want a structured check, a privacy advice review can help you identify gaps before they turn into incidents.

Key Takeaways

  • A data breach can be caused by hacking, human error, lost devices, or supplier failures - and it can still create legal obligations for your business.
  • Under the Privacy Act 2020, you should take reasonable steps to protect personal information and respond properly if an incident occurs.
  • You may need to notify the Privacy Commissioner and affected individuals where a breach has caused (or is likely to cause) serious harm, so it’s important to assess the risks quickly and carefully.
  • Strong legal foundations reduce cyber risk: make sure your Employment Contracts, confidentiality terms, and supplier arrangements reflect how data is actually handled in your business.
  • CCTV, monitoring tools and call recording can support cyber security, but you need to balance security with privacy and communicate transparently.
  • A clear breach response plan helps you act fast, preserve evidence, contain harm, and communicate in a consistent way when it matters most.

If you’d like help strengthening your privacy compliance, updating your contracts, or putting a practical breach response plan in place, you can reach us at 0800 002 184 or team@sprintlaw.co.nz for a free, no-obligations chat.

Rowan Gardoce
Rowan GardoceMarketing Coordinator

Rowan is the Marketing Coordinator at Sprintlaw. She is studying law and psychology with a background in insurtech and brand experience, and now helps Sprintlaw help small businesses

Need legal help?

Get in touch with our team

Tell us what you need and we'll come back with a fixed-fee quote - no obligation, no surprises.

Keep reading

Related Articles

Legal Compliance And Ethics In Data Collection For NZ Businesses

Legal Compliance And Ethics In Data Collection For NZ Businesses

If you run a small business in New Zealand, chances are you’re collecting data every day - customer enquiries, online orders, email sign-ups, CCTV footage, loyalty program details, and even staff records....

14 May 2026
Read more
AI Model and Data Licence Agreements: Common Mistakes for New Zealand Businesses

AI Model and Data Licence Agreements: Common Mistakes for New Zealand Businesses

Signing an ai model and data licence without checking ownership, training rights, privacy terms and liability can create real commercial risk. This guide

13 May 2026
Read more
Health Data Sharing Agreements in New Zealand: Privacy Issues for Businesses

Health Data Sharing Agreements in New Zealand: Privacy Issues for Businesses

A health data sharing agreement can expose New Zealand businesses to serious privacy risk if the contract does not match how health information is

11 May 2026
Read more
Cross-border Data Transfer Addendums: Privacy Issues for New Zealand Businesses

Cross-border Data Transfer Addendums: Privacy Issues for New Zealand Businesses

Using overseas software or service providers can expose New Zealand businesses to privacy risk if personal information is transferred offshore without the

9 May 2026
Read more
Is It Legal To Record Or Photograph A Child Without Consent In NZ?

Is It Legal To Record Or Photograph A Child Without Consent In NZ?

If you run a small business, there’s a good chance you’ll come across situations where children appear in photos or recordings. Maybe you’re filming content for social media, running a school holiday...

9 May 2026
Read more
Is It Legal To Record Conversations In New Zealand?

Is It Legal To Record Conversations In New Zealand?

If you run a small business, there’s a good chance you’ve thought about recording conversations at some point. Maybe you want to record customer service calls for training, keep a clear record...

9 May 2026
Read more
Need support?

Need help with your business legals?

Speak with Sprintlaw to get practical legal support and fixed-fee options tailored to your business.