Abinaja is the legal operations lead at Sprintlaw. After completing a law degree and gaining experiencing in the technology industry, she has developed an interest in working in the intersection of law and tech.
How To Build A Data Breach Response Plan (Step-By-Step)
- Step 1: Set Your Objectives (So You Don’t Panic-Write A Plan Later)
- Step 2: Appoint A Response Team And Define Roles
- Step 3: Decide What Triggers Your Plan (And How Staff Should Report Issues)
- Step 4: Build Your “First 60 Minutes” Containment Checklist
- Step 5: Map Your Data So You Can Quickly Work Out “What Was Exposed”
- Step 6: Add A “Serious Harm” Assessment Workflow
- Step 7: Prepare Your Notification Templates (Before You Need Them)
- Step 8: Set Your Evidence And Record-Keeping Rules
- Step 9: Add A Post-Incident Review (So You Actually Improve)
- Key Takeaways
Most business owners don’t plan for a data breach the same way they plan for sales, hiring, or growth.
But in practice, a data breach response plan is one of those “legal foundations” documents that can save you a huge amount of time, stress, and reputational damage when something goes wrong.
This guide is updated for current expectations and risk trends (without the fluff), and it walks you through how to build a practical response plan that fits a typical New Zealand small business or startup.
We’ll keep it simple: what a data breach is, what your obligations can look like under the Privacy Act 2020, and the exact steps you can document so your team knows what to do from minute one.
What Counts As A Data Breach (And Why It’s Not Just “Getting Hacked”)
When people hear “data breach”, they often picture a dramatic cyberattack.
In reality, a breach can be far more ordinary - and that’s exactly why having a response plan matters.
Common Examples Of Data Breaches In NZ Businesses
- Email mistakes: sending customer details to the wrong person, CC’ing instead of BCC’ing, attaching the wrong file.
- Lost or stolen devices: laptops, phones, tablets, or USBs that aren’t encrypted or are logged into business accounts.
- Credential compromise: an employee’s password reused across services, phishing links, weak passwords, no MFA.
- Access control failures: a staff member has access to information they shouldn’t (or former staff still have access).
- Supplier incidents: your IT provider, booking system, CRM, payroll platform, or cloud host has a breach that affects your data.
- Physical breaches: paper files left in public, unsecured storage, or unauthorised access to an office.
What “Personal Information” Usually Means
Under the Privacy Act 2020, “personal information” is broadly information about an identifiable individual. For many businesses, that includes:
- names, contact details, and addresses
- purchase history and customer notes
- ID documents (even partial copies)
- employee records and payroll information
- logins, usernames, passwords (or password hashes)
- health information (if you’re in health, wellness, counselling, fitness, or related services)
If you collect, use, store, or share personal information, it’s worth having both (1) an everyday compliance framework (like a Privacy Policy) and (2) a “things went wrong” playbook - your response plan.
Do You Legally Need A Data Breach Response Plan In New Zealand?
There isn’t one single rule that says every business must have a “data breach response plan” document with that exact title.
But having a plan is one of the clearest ways to show you’re taking privacy seriously and meeting your obligations to protect personal information with reasonable safeguards.
The Privacy Act 2020 And “Notifiable” Privacy Breaches
The Privacy Act 2020 introduced a mandatory notification regime for certain breaches (often called “notifiable privacy breaches”). In plain terms, if a breach creates (or is likely to create) serious harm to affected individuals, you may need to notify:
- the affected individuals (unless a limited exception applies), and
- the Office of the Privacy Commissioner (OPC).
Whether harm is “serious” depends on the facts - like the sensitivity of the information, how many people are affected, whether it’s protected (e.g. encrypted), and what a bad actor could do with it.
This is where a response plan becomes practical: it forces you to decide who assesses serious harm, how fast, and what evidence you’ll record while the situation is unfolding.
Why Regulators (And Customers) Expect A Plan
Even if your breach turns out not to be “notifiable”, a messy response can still create real exposure:
- customers lose trust (and churn is expensive)
- contracts can be breached (especially with enterprise clients)
- you can waste days debating what to do instead of containing the incident
- staff can accidentally make things worse (e.g. deleting logs, sending incorrect communications)
If you’re building out your privacy compliance properly, a Information security policy and a response plan should work together - one reduces the chance of a breach, the other reduces the damage when one happens.
How To Build A Data Breach Response Plan (Step-By-Step)
A good response plan is not a 40-page legal document that nobody reads.
It’s a clear set of steps, roles, and templates your team can follow under pressure - including at 9pm on a Sunday when someone realises an account has been compromised.
Step 1: Set Your Objectives (So You Don’t Panic-Write A Plan Later)
Write down what you want the plan to achieve. Most NZ businesses will want a plan that helps them:
- contain the breach quickly
- protect individuals from harm
- meet Privacy Act notification obligations
- keep accurate records for later review
- communicate clearly (internally and externally)
- restore systems and prevent recurrence
This sounds obvious, but it stops the plan turning into a generic template that doesn’t match how your business actually works.
Step 2: Appoint A Response Team And Define Roles
Your plan should name roles (and backups), not just vague job titles.
For small businesses, one person may hold multiple roles - that’s fine, as long as it’s clear.
- Incident Lead: owns the response, makes final calls, keeps the timeline moving.
- Technical Lead (internal or external): investigates cause, contains systems, preserves logs.
- Privacy Lead: assesses whether personal information is involved and whether serious harm is likely.
- Comms Lead: handles customer messaging, staff comms, and media if needed.
- Legal/Compliance Support: helps with notification decisions, contract obligations, and privilege where appropriate.
If you don’t currently have privacy capability in-house, it can help to line up a data privacy lawyer you can call quickly when an incident happens, rather than scrambling mid-crisis.
Step 3: Decide What Triggers Your Plan (And How Staff Should Report Issues)
Your plan should clearly state what counts as a “suspected incident” worth escalating.
For example:
- unusual account logins (new location, new device, multiple failed attempts)
- lost/stolen device used for work
- misdirected email with customer or employee data
- ransomware warnings or strange encrypted files
- supplier tells you they’ve had a security incident affecting your data
Include a simple reporting rule for staff, like: “If you think something might be a breach, report it immediately - don’t try to fix it quietly.”
Then give them a single point of contact (email + phone/Slack channel), and include an after-hours process.
Step 4: Build Your “First 60 Minutes” Containment Checklist
This is the heart of a usable response plan.
Your first-hour checklist should focus on stopping further loss without destroying evidence. Depending on your systems, that can include:
- disable compromised accounts and force password resets
- turn on (or enforce) MFA immediately
- revoke API keys / access tokens
- isolate affected devices or servers from the network
- pause suspicious integrations or third-party apps
- preserve logs, emails, screenshots, and timestamps (don’t wipe systems too early)
If you use external IT providers, your plan should include their emergency contact details and what authority they have to act (and what they must ask you before doing).
Step 5: Map Your Data So You Can Quickly Work Out “What Was Exposed”
In a breach, you’ll need to answer basic questions fast:
- What information was accessed, lost, altered, or disclosed?
- Whose information is it (customers, staff, suppliers)?
- How many people are affected?
- Is the data encrypted or otherwise protected?
- Who has received it (known recipient vs unknown attacker)?
If you haven’t already done a basic “data map”, your response plan can include a simple appendix listing:
- systems you use (e.g. Google Workspace/Microsoft 365, Xero, CRM, booking tools)
- what personal information is stored in each system
- who has admin access
- where backups live and who can restore them
This is also the time to align your breach plan with broader incident procedures, like a Privacy incident response plan that covers internal escalation, investigation, and remediation in a consistent way.
Step 6: Add A “Serious Harm” Assessment Workflow
Your plan should set out how you assess whether the breach is notifiable under the Privacy Act 2020.
To keep it practical, include a decision checklist that looks at:
- Sensitivity: is it health info, financial data, passwords, ID documents, or something else that could be misused?
- Security safeguards: was it encrypted, tokenised, password-protected, or otherwise protected?
- Likelihood of misuse: do you know who received it? Was it an honest mistake with a trustworthy recipient, or an unknown attacker?
- Potential impacts: identity theft, financial loss, humiliation, loss of employment, safety risks, discrimination.
- Scale: number of individuals affected and how widely information could spread.
Also decide who makes the call, and what documentation they need to keep (including why you decided it was or wasn’t notifiable).
Step 7: Prepare Your Notification Templates (Before You Need Them)
If notification is required, the hardest part is often communicating clearly while facts are still emerging.
Templates help you avoid delays and reduce the risk of sending inconsistent messages.
Most plans include templates for:
- Customer notification: what happened, what information is involved, what you’re doing, what they can do.
- OPC notification: summary of incident, harm assessment, containment steps, and next steps.
- Internal staff message: what staff should (and shouldn’t) say, how to escalate queries.
- Client or partner notification: where you have contractual reporting obligations.
It’s also smart to document your process for formal notification in the plan itself - including when you’ll use a data breach notification workflow and who signs off on the final message.
Step 8: Set Your Evidence And Record-Keeping Rules
When the dust settles, you’ll want a clean record of:
- when the incident was discovered
- who reported it
- what immediate steps were taken
- what systems and data were affected (and how you know)
- your serious harm assessment and reasoning
- who was notified and when
- what remediation steps were implemented
This isn’t just paperwork for its own sake. If someone complains later, or you need to show you handled the incident responsibly, those records matter.
Step 9: Add A Post-Incident Review (So You Actually Improve)
After an incident, build in a “lessons learned” process. You can keep it simple:
- What caused the incident?
- What failed (technology, process, training, supplier controls)?
- What worked well in the response?
- What do we need to change within 30 days?
- Do we need to update policies, contracts, or staff training?
This is where your plan stops being a one-off document and becomes part of your ongoing risk management.
What Should Your Data Breach Response Plan Include?
Once you’ve worked through the steps above, you’ll want to package it into a document your business can actually use.
Here’s what we typically expect to see in a solid data breach response plan for an NZ business.
Core Sections To Include
- Purpose and scope: which parts of the business, systems, and data the plan covers.
- Key definitions: what counts as a breach, personal information, and “serious harm” (in plain English).
- Roles and responsibilities: named role owners + backups, including external IT contacts.
- Incident reporting process: who staff contact, what details to provide, and after-hours escalation.
- Immediate containment checklist: first-hour actions and evidence preservation rules.
- Investigation workflow: how you identify affected systems, accounts, and datasets.
- Harm assessment framework: how you decide if notification is required under the Privacy Act 2020.
- Notification process and templates: internal + external messaging, plus approval steps.
- Remediation plan: short-term fixes and longer-term improvements.
- Record keeping: incident log template and document retention guidelines.
- Review schedule: how often you’ll review and test the plan (and after any incident).
Make Sure Your Plan Matches Your Actual Business Setup
This is where many templates fall down: they assume you’re a large organisation with a security team and dedicated compliance staff.
If you’re a small business, your plan should reflect reality, like:
- you outsource IT support
- one founder makes most decisions
- you use SaaS tools for almost everything
- you have casual staff or contractors accessing customer data
If your people don’t know where the plan is stored, or the plan doesn’t match your systems, it won’t help when you need it.
Don’t Forget Your Contracts And Third-Party Providers
A lot of breaches involve suppliers (or at least require supplier support to investigate).
Your plan should identify:
- which suppliers hold personal information on your behalf
- who to contact at each supplier for urgent security incidents
- any contractual notification timeframes (some require notice within 24–72 hours)
- what evidence you’ll request from them (incident summary, timeline, impacted records, mitigation)
If you work with larger clients, your customer contracts may also require you to follow specific security standards and reporting steps. It’s much easier to align those obligations upfront than to interpret them under pressure.
Link Your Plan Back To Your Day-To-Day Privacy Compliance
Your response plan shouldn’t sit in a vacuum. It should align with what you tell customers and staff about your information handling practices.
For example, your Privacy Policy often describes how you protect personal information and how people can contact you with privacy questions - so your plan should include who monitors that inbox and how requests are triaged during an incident.
And if you’re formalising this properly, it can help to keep your response plan alongside a dedicated Data breach response plan document that’s tailored to your systems, team structure, and the kinds of information you actually hold.
Key Takeaways
- A data breach isn’t just hacking - it can be an email mistake, lost device, unauthorised access, or a supplier incident, and it can happen to any NZ business.
- Under the Privacy Act 2020, some privacy breaches may be “notifiable” if serious harm is likely, so you need a clear workflow to assess harm and document your decision-making.
- A practical response plan should include roles, reporting pathways, a first-hour containment checklist, investigation steps, notification templates, and a post-incident review process.
- Your plan should reflect your real setup (SaaS tools, outsourced IT, small teams), otherwise it won’t be usable when it matters.
- Preparing templates and approval steps upfront helps you respond faster and communicate more consistently with affected individuals, the OPC, and key commercial partners.
- It’s worth aligning your breach response plan with your broader privacy and security documentation, including your Privacy Policy and internal security policies.
If you’d like help preparing a data breach response plan that fits your business (and is consistent with your Privacy Act obligations and contracts), you can reach us at 0800 002 184 or team@sprintlaw.co.nz for a free, no-obligations chat.


