What happens in the first 72 hours after a Data Breach?
Immediately after recognising a data breach, an organisation must assess the impact, contain the breach, decide whether ICO notification is required, and document every action and decision.
Even if the organisation is unable to contain or even fully understand the scope of the breach: If there is risk to the affected data subjects then the ICO needs to be notified.
Why this Matters
The UK GDPR imposes a 72‑hour window to assess and, where required, notify the regulator of a personal data breach.
Poor preparation leads to rushed decisions, incomplete evidence, and increased regulatory risk.
Regulators assess how decisions were made, not just what decision was taken.
The first 72 Hours: Step by Step
0–24 Hours: Containment & Fact‑Finding (IT‑Led)
Primary objective: Stop further data loss and establish the facts.
What happens
- Systems or accounts are isolated
- Access is restricted or revoked
- Malicious activity is contained
- Initial timelines are established
IT responsibilities
- Identify affected systems
- Preserve logs and forensic evidence
- Prevent further compromise
Evidence created
- Incident start time and detection method
- Containment actions taken
- Initial system and access logs
24–48 Hours: Impact & Risk Assessment (IT + DPO)
Primary objective: Understand whether personal data is affected and assess risk to individuals.
Key questions
- Was personal data involved?
- What categories of data were affected?
- How many individuals are impacted?
- What possible harms might come to the data subjects (financial, emotional, safety, discrimination)?
Roles
- IT: Provides factual technical detail and timelines
- DPO: Advises on GDPR implications and risk assessment
Evidence created
- Data categories and volumes affected
- Risk and harm assessment
- DPO advice and recommendations
48–72 Hours: Notification Decision & Escalation
Primary objective: Decide whether notification is required and prepare communications.
Decision points
- Is notification to the regulator required?
- Are affected individuals at high risk?
- What mitigation steps reduce impact?
Accountability
- The organisation makes the decision
- The DPO advises and documents the rationale
If notification is required
- Regulator notification is prepared and submitted
- Communications to individuals are drafted
Evidence created
- Notification decision and rationale
- Draft or submitted notifications
- Internal escalation and approval records
What Regulators Expect to See
Regulators do not expect perfection. They expect timely, reasoned, and evidenced decision‑making.
Typically requested evidence includes:
- Incident timeline
- Technical facts and containment actions
- Risk assessment and DPO advice
- Notification decision (including where no notification was made)
- Remediation and lessons learned
Common Failure Points in the First 72 Hours
- Delayed escalation from IT to DPO
- Decisions made verbally with no record
- Missing or overwritten logs
- Confusion over who owns the decision
- Scrambling to reconstruct events after the fact
What Good Preparation Delivers
Organisations that prepare in advance typically achieve:
- Faster containment
- Clearer decision‑making
- Lower regulatory exposure
- Calmer, more confident leadership response
Preparation turns the 72‑hour window from a panic period into a controlled process.
How IT Teams Support a Defensible Response
IT teams play a critical role by:
- Preserving accurate timelines
- Acting promptly on decisions around investigation and mitigation
- Providing clear, factual input
- Supporting evidence capture
- Escalating promptly and appropriately
IT does not decide notifiability; but do IT evidence enables defensible decisions.
What “Good” Looks Like
Well‑run organisations:
- Have rehearsed breach response processes
- Know who escalates to whom, and when
- Capture evidence as incidents unfold
- Document decisions as they are made
This allows boards, DPOs, and regulators to see control, not confusion.
Related Answers
- When does a security incident become a GDPR breach?
- Who decides if a GDPR breach is reportable?
- What role does IT play during a GDPR investigation?
- What should a board do after a data breach?
Want to pressure‑test your first‑72‑hour readiness?
Explore how mature organisations structure breach response, escalation, and evidence capture before an incident occurs.
View the GDPR‑aligned incident response model
