If your website’s been hacked, this question turns up very quickly, usually somewhere between panic and regret.
Do I need to tell my clients?
Am I legally required to?
Will this blow up my reputation?
Unfortunately, most advice online is either written by lawyers covering themselves, or by people confidently repeating things that simply aren’t true.
So let’s slow it down and deal with reality instead of internet hysteria.
A hacked website does not automatically mean a data breach
This is the most important thing to understand, and it’s where a lot of businesses get misled.
Your website being hacked does not automatically mean client data was breached.
Under UK GDPR, the issue isn’t “was the website hacked”.
The issue is whether personal data was accessed, exposed, altered, or put at risk.
If no personal data was involved, there may be nothing to notify anyone about at all.
Yes, really.
What actually counts as a data breach under UK GDPR?
In plain English, a data breach involves unauthorised access to personal data.
Personal data includes things like:
- Names
- Email addresses
- Phone numbers
- Login details
- Payment information
It does not include:
- Your homepage
- Your blog posts
- Your logo
- Your About page looking a bit odd
So the key question is not “was my site hacked”, but:
Was personal data accessed or put at risk?
Everything flows from that.
When you usually don’t need to tell clients
In many small business cases, notification is not required.
Common examples:
- A brochure site with no stored user accounts
- A basic contact form that emails enquiries but doesn’t store them
- No evidence of database access
- No signs of admin accounts being abused
If there is no personal data involved, or no reasonable risk to individuals, UK GDPR does not require you to notify clients just because your site was compromised.
This surprises people. It shouldn’t, but it does.
When you may need to notify clients
There are situations where notification becomes necessary.
You may need to notify clients if:
- Personal data is stored in your website database
- Customer accounts or admin accounts were accessed
- Payment systems or client portals were involved
- There is evidence data was exfiltrated or tampered with
- Individuals could realistically be affected
The legal test isn’t embarrassment or inconvenience.
It’s risk to the rights and freedoms of individuals.
If that risk exists, you need to take it seriously.
What UK GDPR actually expects you to do
Despite what some blogs imply, UK GDPR does not demand public confessions for every technical incident.
What it expects is proportionate, documented decision-making.
That usually means:
- Investigating what happened
- Establishing what data was involved
- Recording the incident internally
- Assessing the risk to individuals
If there is a risk to individuals, you may need to:
- Notify the ICO within 72 hours
- Notify affected individuals if the risk is high
If there isn’t, you document your reasoning and move on.
That documentation matters more than panic emails.
If you do need to notify clients, what should you say?
This is where people often make things worse.
If notification is required, it should be:
- Clear
- Factual
- Calm
- Free of speculation
Explain:
- What happened (briefly)
- What data was involved
- What you’ve done to fix it
- What, if anything, clients need to do
Do not:
- Guess
- Apologise for things you don’t understand yet
- Use dramatic language
- Overpromise future security perfection
Honesty is good. Over-sharing is not.
Common mistakes that cause unnecessary panic
These come up constantly:
- Announcing a “data breach” without evidence
- Copying US-based advice that doesn’t apply in the UK
- Notifying clients before understanding the scope
- Treating hosting warnings as legal conclusions
Noise does not equal compliance.
Calm assessment does.
So, do you need to tell clients your website was hacked?
Sometimes yes. Often no.
If personal data was accessed or put at risk, notification may be required.
If it wasn’t, it usually isn’t.
The deciding factor is not fear, reputation, or worst-case thinking.
It’s what actually happened.
If you don’t know that yet, the right move isn’t to email everyone.
It’s to find out.
If you’re unsure
That’s normal. Most business owners aren’t meant to be incident response specialists.
The sensible first step is understanding:
- What was accessed
- What wasn’t
- And whether any real risk exists
Once you know that, the decision becomes a lot less dramatic and a lot more boring.
Which, in situations like this, is exactly what you want.

