< Back to latest news & events

Articles

British Airways’ fine reduced to £20 million

October 2020

Information Commissioner’s Office substantially reduces the intended fine following BA submissions and full consideration of the issues.

Back in September 2018 we wrote about BA experiencing a large scale data breach following a sophisticated criminal attack which involved the bad actor compromising BA’s systems by misusing legitimate credentials which BA had given a third party service provider’s staff member. In the aftermath of the breach, the ICO announced their intention to fine BA £183 million, however, following three rounds of submissions from BA the ICO have now issued a notice that they are fining BA £20 million (initially reduced down to £30 million then to £20 million including a £3 million COVID-19 deduction) for the data breach that affected more than 400,000 BA customers; and allowed unlawful access to over 100,000 credit card details.

While reducing the fine by over £160 million will be seen as a success by BA, given the wider challenges faced in the aviation industry, the fine is still unwelcome. That said, from an outsider’s perspective £20 million would seem like a much larger sanction and deterrent, had the ICO not initially indicated a much larger figure.

BA’s issues stem from having IT systems in place that did not provide an adequate degree of security, particularly given the volume and nature of the personal data being processed. Further, information was being retained which BA did not need (or even intend to retain). BA did not even discover the security breach itself, indicating inadequate network monitoring, but rather was informed of an anomaly by an observant third party which sparked their response efforts. There is always a challenge in preparing for and preventing all possible attacks from malicious actors, however BA’s approach was considered inadequate, which led to this fine. BA does have a right to appeal so this process may not be over yet.

To avoid ending up in a similar position, it is essential that businesses have the technical and organisational systems in place to protect the personal data they process and that they deploy automated monitoring tools scanning for system anomalies which may indicate a personal data breach is happening. Such measures should be proportionate to the nature (e.g. volume, risk, sensitivity) of the personal data being processed. Consideration should also be given to only retaining personal data for as long as necessary with appropriate operationalisation of data retention policies.

BA does get credit for its response to the breach once  discovered. Under GDPR, given the seriousness of the breach and the risks to customers, BA was obliged to notify promptly the ICO, which it did, suggesting its internal processes around data breach reporting were up to date. As mentioned in our previous article, data breach reporting (introduced by GDPR) has brought a new angle to how organisations respond to data breaches. Breaches do not necessarily need to be reported unless they are of a serious nature but where they are reportable there are tight timescales for action. Given the timescales required, the time it may take to identify the nature of a breach and whether it is reportable, having clear policies, procedures and reporting lines avoids confusion, enables reportable breaches to be correctly identified, and mitigates the publicity and regulatory fallout of a muddled or non-compliant approach. Organisations with mature data protection programs hold regular personal data breach simulations to rehearse their response times and effectiveness.

Being prepared to handle a breach involves identifying people within your organisation who have responsibility for data protection, ensuring employees know the importance of reporting a breach, setting out key criteria for decision making and keeping a record not just of reportable breaches but also of non-reportable breaches which includes your justification for not reporting.

Given that two and a half years have passed since the introduction of GDPR now might be a good time to consider reviewing your organisation’s policies and procedures around data protection and whether much has changed in the way you handle personal data since they were put in place. Sophisticated organisations increasingly engage “white hat” hackers to test their data security to identify weak spots before the bad actors do. Given the ongoing nature of working towards GDPR compliance, if your data breach response policies and procedures haven’t been looked at since they were put together, the reminder of the financial and publicity implication of failures in this area might prompt an overdue review!

This article was prepared by HGF Senior IP Solicitors James Talbot and Emily Nousios. If you would like further advice on this or any other matter, please contact James or Emily. Alternatively, you can contact your usual HGF representative or visit our Contact page to get in touch with your nearest HGF office.

Latest updates

Event - 23rd - 25th March 2026

HGF are Gold Sponsors of IPBC Europe 2026

HGF are proud sponsors of IPBC Europe 2026, taking place from 23-25 March 2026 at the Pullman Paris Montparnasse. Bringing together patent pioneers, in-house leaders and private practice specialists, IPBC …

Event details
Event - 8th - 11th February 2026

AUTM Meeting 2026

We are attending the AUTM Annual Meeting from 8–11 February, a flagship event bringing together technology transfer professionals from across the globe. AUTM connects innovators, universities, and industry leaders to …

Event details

The Antibody Series #4 | pH points in antibody claims: when “same pH ” becomes an addition of matter

The Boards of Appeal of the EPO (BoA) are the appeal body that reviews EPO decisions; in this case, they reviewed a revocation in opposition of a patent relating to …

Read article

The Antibody Series #2 | Definition via binding strength in antibody claims: when “binds strongly... but only minimally...” becomes a trap of lack of clarity

Defining an antibody by its binding strength is common practice in patent claims, but it can quickly become a pitfall under Article 84 EPC on clarity. In this second installment …

Read article
Event - 3rd February 2026

HGF Brand & Design Conference 2026

Join us on 3rd February 2026 for HGF’s Brand & Design Conference, the must attend event for in-house legal teams, brand leaders, creatives, and innovators shaping the future of IP. …

Event details
Event - 14th January 2026

Seminar on The aftermath of G1/24 - has anything changed?

HGF is hosting a The aftermath of G1/24 – has anything changed? Which will be followed by networking, apero, and snacks. The Seminar will be held on Wednesday, 14th January …

Event details

HGF Shortlisted for Women in Diversity Awards 2026

We are proud to announce that we’ve been shortlisted in the Diversity and Inclusion Initiative or Programme of the Year category for the Women in Diversity in Law Awards 2026, …

Read article
Event - 24th - 25th November 2025

HGF Partners with 3AF for the P2I2025 Symposium

HGF are pleased to be a partner of P2I2025, the annual symposium organised by the Intellectual Property Commission of the French Aeronautics and Astronautics Association (3AF). The event brings together …

Event details