Alex is Sprintlaw’s co-founder and principal lawyer. Alex previously worked at a top-tier firm as a lawyer specialising in technology and media contracts, and founded a digital agency which he sold in 2015.
Cybersecurity isn’t just an “IT issue” anymore. If you’re running a small business in New Zealand, it’s also a legal and commercial risk you need to manage from day one.
Even if you’re not a tech company, you probably collect and store valuable information like customer contact details, staff records, payment information, supplier bank details, login credentials, or health information (depending on what you do). That data can be targeted by hackers, leaked by accident, or exposed through a third-party system you rely on.
The good news is you don’t need an enterprise-sized budget to improve your cybersecurity posture. What you do need is a practical plan that covers both (1) technical safeguards and (2) your legal obligations when something goes wrong.
Below, we walk through the key cybersecurity legal essentials for data protection and breach response in NZ, what “reasonable security” looks like in practice, and how to respond if you suspect a data breach.
Why Cybersecurity Is A Legal Issue (Not Just A Tech Problem)
It’s easy to think of cybersecurity as firewalls, passwords, and software updates.
But from a legal perspective, cybersecurity is really about how your business handles risk and responsibility:
- Risk to customers if their personal information is accessed, leaked, or misused.
- Risk to staff if payroll records, bank details, or identity documents are exposed.
- Risk to your business if confidential information, pricing, supplier terms, or trade secrets are compromised.
- Risk to your operations if you’re locked out of systems (for example, ransomware) and can’t trade.
Once you frame it that way, cybersecurity becomes part of your “legal foundations” in the same way contracts, employment documents, and consumer compliance are.
If your business collects personal information, you’ll also need to think about privacy compliance and how you communicate your practices to customers and users. For many businesses, that includes having a fit-for-purpose Privacy Policy in place.
What NZ Law Requires: The Privacy Act 2020 And “Reasonable Security”
In New Zealand, the key legislation relevant to cybersecurity and data handling is the Privacy Act 2020.
The Privacy Act doesn’t say “you must use X brand of security software” or “you must have a dedicated IT manager”. Instead, it focuses on outcomes and expectations: if you hold personal information, you need to protect it with reasonable safeguards.
What Counts As “Personal Information”?
Personal information is broadly any information about an identifiable individual. For a small business, that commonly includes:
- Customer names, emails, phone numbers, addresses
- Order history and customer account details
- ID documents you’ve collected for verification (where relevant)
- Employee records (contracts, bank details, IRD numbers, emergency contacts)
- Health information (if you operate in health, wellness, or related services)
If you have employees, you’re likely holding highly sensitive information as part of “business as usual”, which is why cybersecurity and HR processes need to work together. A well-drafted Employment Contract can also help set expectations around confidentiality, acceptable use of systems, and handling business information.
What Does “Reasonable” Security Look Like For A Small Business?
“Reasonable safeguards” will depend on your business size, what information you hold, and how serious the harm could be if it’s exposed. That said, small businesses are still expected to take practical steps (and to keep improving them).
Common, sensible cybersecurity measures include:
- Access controls (only staff who need data should be able to access it)
- Strong authentication (use multi-factor authentication for email, accounting, and admin logins)
- Secure password practices (unique passwords, password manager, no shared logins)
- Device security (screen locks, encryption where possible, remote wipe for lost devices)
- Regular updates and patching (operating systems, plugins, point-of-sale software)
- Backups (and testing that backups can actually be restored)
- Staff training (phishing, suspicious links, invoice scams, “CEO fraud”)
- Vendor checks (knowing what third-party tools store your customer data and where)
From a legal risk perspective, the main point is this: if something goes wrong, you want to be able to show you took sensible steps to prevent it, and that your response was prompt and organised.
Common Cybersecurity Risks For Small Businesses (And Where Legal Problems Start)
Most small businesses don’t get hacked because someone “targeted” them personally. They get caught by broad, automated attacks or everyday mistakes.
Here are some of the common cybersecurity risk areas that quickly become legal problems if you don’t have a plan.
Phishing And Business Email Compromise
This might look like a fake invoice from a “supplier” or an email that appears to come from you asking staff to reset passwords.
If staff are tricked into handing over login details, attackers can:
- access customer data,
- send emails impersonating your business, or
- redirect payments by changing bank details on invoices.
That can trigger disputes with customers or suppliers about who is responsible for the loss, especially if invoices and payment instructions are involved.
Lost Devices And Unauthorised Access
A stolen laptop or misplaced phone can be a “data breach” if it contains personal information and isn’t properly secured.
Even if you’re confident “no one will look at it”, it’s still a risk you need to treat seriously.
Third-Party Systems And Contractors
Many small businesses rely on third parties for:
- website hosting
- email platforms
- CRM systems
- booking and payment tools
- IT support providers
If one of these providers has a security issue, your business can still wear the consequences (and you may still need to notify people).
This is where having clear contractual terms matters. For example, if a contractor or service provider is handling sensitive information, you’ll often want a written Service Agreement that addresses confidentiality, data handling, and what happens if an incident occurs.
Insider Risk (Accidental Or Deliberate)
Not all cybersecurity incidents are “hackers”. Sometimes it’s a staff member accidentally emailing a spreadsheet to the wrong person, or downloading customer data to a personal device.
Sometimes it’s more serious: a disgruntled worker taking client lists when leaving.
Legal protection here often comes down to setting expectations upfront and documenting them properly (including confidentiality and system-use rules), rather than trying to patch things up after the fact.
What To Do If You Suspect A Data Breach: A Practical Legal Response Plan
When a cybersecurity incident happens, time matters. But acting fast doesn’t mean panicking. The goal is to follow a sensible process that (1) reduces harm and (2) puts you in the best position legally.
Step 1: Contain The Breach (Stop The Bleeding)
First, try to prevent further access or loss. Depending on the incident, this could include:
- resetting passwords and forcing logouts
- disabling compromised accounts
- disconnecting affected devices from the network
- pausing payment processing if relevant
- contacting your IT provider urgently
Make sure whoever is responsible internally knows exactly what they’re authorised to do in an emergency (and what needs approval).
Step 2: Preserve Evidence And Keep Notes
It’s tempting to “clean everything up” straight away. But you should also preserve information that helps you understand what happened and demonstrate what you did in response.
Keep records like:
- when the incident was discovered
- what systems/accounts were affected
- what actions were taken and by whom
- copies of suspicious emails or logs (where available)
This documentation becomes important if you need to notify affected people, respond to the Office of the Privacy Commissioner, deal with disputes, or make an insurance claim.
Step 3: Assess Whether It’s A “Notifiable Privacy Breach”
Under the Privacy Act 2020, you may need to notify the Office of the Privacy Commissioner and affected individuals if a privacy breach has caused (or is likely to cause) serious harm to an individual.
Whether the “serious harm” threshold is met depends on the circumstances, including:
- the sensitivity of the information (for example, health information is usually higher risk)
- how many people are affected
- who has accessed the information (a trusted staff member vs an unknown attacker)
- whether the information is protected (for example, encrypted)
- what harm could realistically happen (identity theft, financial loss, humiliation, discrimination)
Because the “serious harm” test depends on context, it’s often worth getting legal advice early, especially if you’re on the fence about whether notification is required.
Many businesses also formalise their internal approach with a documented Data Breach Response Plan so that you’re not making it up under pressure.
Step 4: Notify The Right People (Without Making Things Worse)
If notification is required, it’s important that the message is accurate, timely, and clear.
In practice, your notifications should explain:
- what happened (in plain language)
- what information was involved (without oversharing technical details that create further risk)
- what you’ve done to contain the issue
- what steps affected people can take to protect themselves
- how they can contact you for support
It’s also important to think about reputational risk and consumer trust. Transparent communication can actually reduce long-term damage, but only if it’s handled carefully and consistently.
Depending on your situation, you may also need a formal Data Breach Notification prepared (and reviewed) to help you meet your obligations without creating additional liability.
Step 5: Fix The Root Cause And Improve Your Systems
Cybersecurity isn’t a one-off compliance exercise. Once you’ve dealt with the immediate incident, you should review what went wrong and what needs to change.
This might include:
- updating access permissions
- adding multi-factor authentication across systems
- improving staff training
- tightening vendor arrangements
- updating your written policies
If the breach involved poor internal processes (for example, staff sharing logins), this is also a good time to revisit employment documentation and workplace policies so expectations are clear going forward.
Legal Documents And Policies That Strengthen Your Cybersecurity Position
Good cybersecurity is part technical, part behavioural, and part contractual.
Even if your systems are strong, you’ll still be exposed if your contracts don’t match how your business actually operates (especially when other people handle data for you).
Privacy Policy And Collection Notices
If you collect personal information from customers (online or offline), your privacy documentation needs to reflect what you collect, why you collect it, how you store it, and who you share it with.
This helps with compliance, but it also helps manage expectations if something goes wrong. Inconsistency between what you say you do and what you actually do can create bigger issues than the breach itself.
Contracts With Service Providers (Especially Tech Providers)
Think about your web developer, IT support, software providers, payment providers, marketing providers, and anyone else who might access personal information.
Key clauses to consider include:
- Confidentiality and limits on using your data
- Security obligations (minimum standards, access restrictions)
- Breach notification (timeframes and what they must tell you)
- Liability allocation (what happens if their mistake causes your loss)
- Subcontracting rules (can they pass your data on to someone else?)
If you’re outsourcing work, it can also be worth documenting exactly what’s being provided and what “good” looks like. For ongoing IT or security support, a properly drafted Service Level Agreement can be a practical way to set response times and responsibilities during incidents.
Confidentiality And Acceptable Use Rules For Staff
Your team can be your strongest defence or your biggest vulnerability (usually unintentionally).
Clear written expectations can help with:
- how staff should store and share files
- how to report suspicious messages
- whether personal devices can be used for work
- what happens when someone leaves (returning devices, removing access)
This is also one of those areas where generic templates can leave gaps. Your policies should match how you actually operate (for example, if you use remote workers, contractors, or shared devices).
Key Takeaways
- Cybersecurity is a legal and commercial issue for NZ small businesses, especially if you hold customer or employee personal information.
- The Privacy Act 2020 expects you to take reasonable steps to protect personal information, which typically includes access controls, secure authentication, staff training, and vendor oversight.
- Many cybersecurity incidents start with phishing, lost devices, third-party systems, or human error, so your response plan needs to cover people and processes (not just technology).
- If a breach is likely to cause serious harm, it may be a notifiable privacy breach and you may need to notify affected individuals and the Office of the Privacy Commissioner.
- Having the right documents in place (such as a Privacy Policy, contracts with service providers, and clear staff confidentiality rules) can reduce risk and make breach response far easier.
- A clear, documented approach to incident response helps you act quickly, limit harm, and show you took the situation seriously.
Note: This article is general information only and doesn’t take into account your specific circumstances. It isn’t legal advice.
If you’d like help putting the right legal protections in place for your cybersecurity approach (or responding to a suspected data breach), you can reach us at 0800 002 184 or team@sprintlaw.co.nz for a free, no-obligations chat.


