Alex is Sprintlaw’s co-founder and principal lawyer. Alex previously worked at a top-tier firm as a lawyer specialising in technology and media contracts, and founded a digital agency which he sold in 2015.
If you run a small business, you probably rely on trust every day. Your team sees customer details, pricing, supplier arrangements, product ideas, internal emails, and (sometimes) sensitive HR information.
That’s why a confidentiality breach at work can feel like more than “just a mistake” - it can quickly turn into a customer complaint, a reputational issue, a legal risk, or even a competitive threat.
The good news is you can usually reduce the risk dramatically with the right foundations (contracts, policies and systems), and if a breach does happen, there are practical steps you can take to respond quickly and fairly.
What Counts As A Confidentiality Breach At Work?
A confidentiality breach at work is generally any situation where confidential information is accessed, used, or disclosed in a way that isn’t authorised.
It’s not limited to “stealing secrets”. In real workplaces, confidentiality breaches often happen through everyday actions - a careless email, a conversation in the wrong place, or staff using personal devices without thinking through the consequences.
Common Examples Small Businesses See
- Customer information (names, contact details, order history, health information, payment details) being shared with someone who shouldn’t have it.
- Employee information (pay details, performance issues, complaints, disciplinary outcomes) being discussed or circulated outside appropriate channels.
- Pricing, margins or supplier terms being forwarded externally or shared with a competitor.
- Trade secrets and “know-how” (recipes, manufacturing methods, sales scripts, internal processes) being copied or taken to a new workplace.
- Lost devices or accounts (laptops, phones, shared logins) leading to unauthorised access.
- Accidental disclosure like sending a quote or spreadsheet to the wrong email address.
What “Confidential” Usually Means (In Practice)
Confidential information can include:
- Personal information about customers, clients, patients, or staff
- Financial data, budgets, bank details, payroll records
- Business plans, marketing strategy, product roadmaps
- Supplier terms, contracts, tender submissions
- Internal emails, HR notes, complaint investigations
- Any information marked “confidential” (but it doesn’t need to be marked to be confidential)
A practical rule of thumb is this: if you would not want a competitor, customer, or unrelated staff member seeing the information, treat it as confidential and restrict access.
What Are Your Legal Duties As An Employer In NZ?
When you’re dealing with a confidentiality breach at work, your responsibilities usually sit across two big areas:
- Employment obligations (how you manage your team fairly and lawfully), and
- Privacy and data handling obligations (how you protect personal information and respond to incidents).
1) Employment Law: Managing The Issue Fairly
In New Zealand, employment relationships are governed by good faith obligations under the Employment Relations Act 2000. In plain terms, that means if you’re investigating a breach or considering disciplinary action, you need to follow a fair process that’s reasonable in the circumstances.
Even if you’re confident a breach happened, problems can arise if you:
- skip an investigation and jump straight to blame
- don’t give the employee a real chance to respond
- predetermine an outcome (or appear to)
- treat similar incidents inconsistently across staff
This is where having clear confidentiality clauses in your Employment Contract helps - it makes expectations explicit, which can make management of the situation much clearer if something goes wrong.
2) Privacy Law: Protecting Personal Information
If the breach involves “personal information” (information about an identifiable individual), the Privacy Act 2020 is likely in play.
As a business, you’re generally expected to take reasonable steps to protect personal information from:
- loss
- unauthorised access
- unauthorised use, modification, or disclosure
- other misuse
If a privacy breach has caused (or is likely to cause) serious harm, it may be a “notifiable privacy breach”, which can trigger notification obligations (including to the Office of the Privacy Commissioner, and often to affected individuals). Whether a breach is notifiable is fact-specific and depends on the context, the type of information, who has it, and the real-world risk of harm.
Even where notification isn’t legally required, you’ll often still need a plan for how you communicate with affected customers or staff in a responsible way.
This is one reason a tailored Privacy Policy (and internal privacy processes) matters even for small businesses - you’re setting the rules of the road for how information is collected, stored and shared.
3) Health And Safety Duties (Sometimes Overlooked)
Not every confidentiality breach is just “about data”. Sometimes a breach escalates into bullying, harassment, retaliation, or serious workplace conflict - especially where HR information or complaints are involved.
Under the Health and Safety at Work Act 2015, you have duties to ensure (so far as reasonably practicable) the health and safety of workers. If a confidentiality breach leads to psychosocial harm risks in the workplace, you may need to manage those risks as well (for example, ensuring support is available, maintaining appropriate confidentiality during any process, and preventing further harm).
How Do You Prevent Confidentiality Breaches? (A Practical Compliance Checklist)
Most business owners don’t want “more paperwork” - you want fewer surprises. The best prevention approach is to combine clear expectations with practical systems that reduce the chance of human error.
1) Set Clear Expectations In Writing
Prevention starts with your documents. You want staff to understand what confidential information is, how to handle it, and what happens if they don’t.
- Include confidentiality obligations in your Employment Contract (and consider additional clauses for senior staff with access to sensitive information).
- Use a standalone Non-disclosure agreement where you’re sharing sensitive information with contractors, external consultants, or potential business partners.
- Maintain a clear Workplace Policy that covers information handling, acceptable use of devices, and communication expectations.
Templates can be risky here. Confidentiality obligations should reflect your actual business operations - what information you hold, who needs access, and what tools you use (email, CRM, accounting software, shared drives, messaging apps).
2) Limit Access (Because “Need To Know” Is Your Friend)
If everyone can access everything, you’re relying on perfect judgement all the time - and that’s not realistic.
Practical steps include:
- restricting access to HR folders, payroll systems, customer databases, and supplier contracts
- removing access promptly when a staff member changes roles or leaves
- avoiding shared logins (they make investigations very difficult and increase security risk)
- introducing simple classification labels like “Public / Internal / Confidential / Highly Confidential”
3) Train Your Team (And Don’t Rely On “Common Sense”)
Many confidentiality breaches at work happen because staff genuinely don’t realise the risk. A quick onboarding session and periodic refreshers can prevent months of cleanup later.
For training, focus on:
- what counts as confidential in your business
- how to spot phishing or suspicious links
- how to send sensitive documents safely
- where confidential conversations can (and can’t) happen
- what to do immediately if they think they made a mistake
4) Reduce Conflict-Driven Breaches
Not every breach is accidental. Sometimes information gets shared because a staff member is angry, leaving, or has a competing interest.
A clear Conflict of interest policy helps set expectations early - especially if staff have side hustles, family businesses, or close relationships with suppliers/competitors.
5) Have A Plan For Data Incidents Before You Need It
When a breach happens, you don’t want to be building a response plan at 10pm while a customer is emailing screenshots.
A written data breach response plan can help you move faster, preserve evidence, and make more consistent decisions about notifications and communications.
What Should You Do When A Confidentiality Breach At Work Happens? (Step-By-Step)
When you suspect a confidentiality breach at work, the first 24–72 hours matter. Your goals are usually to contain the issue, work out what happened, and respond in a way that’s legally fair and commercially sensible.
Step 1: Contain The Breach
Containment actions depend on the situation, but may include:
- revoking access to systems, resetting passwords, disabling compromised accounts
- recovering devices (laptops, phones, USB drives) where appropriate
- asking recipients to delete an email sent in error (and requesting written confirmation)
- stopping further sharing while you investigate
Be careful not to overreact by cutting off access in a way that looks like punishment before you’ve looked into it - but do act quickly to prevent further harm.
Step 2: Preserve Evidence (Without Turning It Into A Witch Hunt)
Confidentiality incidents often turn on “what was accessed, by whom, and when”.
Helpful evidence can include:
- email audit trails
- download logs from cloud storage
- CRM access history
- screenshots (with dates and context)
- witness notes (who observed what, and when)
If you monitor staff systems or devices, make sure you’re doing it lawfully, transparently, and consistently with your internal policies and privacy obligations (and keep the monitoring proportionate to the issue you’re investigating).
Step 3: Assess The Type Of Information Involved
A practical way to triage seriousness is to ask:
- Is personal information involved? If yes, privacy obligations become more likely.
- Is it commercially sensitive? Pricing, margins, supplier contracts and trade secrets can have immediate competitive impact.
- How many people were affected? One customer vs your entire mailing list is a very different risk profile.
- Who received it? A trusted supplier vs a competitor vs a public social media post.
- Can the disclosure realistically be “undone”? Some disclosures are recoverable, others aren’t.
Step 4: Decide Whether Notifications Are Needed
If personal information is involved, you may need to consider whether the breach is notifiable under the Privacy Act 2020 (generally, whether it has caused or is likely to cause serious harm, taking into account the surrounding circumstances).
Even where formal notification isn’t required, you might still choose to notify affected customers or staff as a trust and relationship measure - particularly if they’re likely to find out anyway, or need to take protective steps (like changing passwords).
This is a point where tailored legal advice can be worth it. A rushed or poorly worded notification can create unnecessary alarm, but saying nothing can create bigger reputational harm if the story spreads.
Step 5: Run A Fair Workplace Investigation
If an employee may be responsible, follow a fair process. In practice, that usually means:
- explaining the concern clearly (what you believe happened and why)
- giving the employee a genuine chance to respond
- considering their explanation with an open mind
- checking whether training, unclear processes, or system failures contributed
- documenting each step
Often, “what you do next” depends on whether the breach was accidental, negligent, reckless, or deliberate.
How Do You Handle The Employee Side Without Creating More Risk?
A confidentiality breach at work can put you in a tricky position: you want to protect your business, but you also need to manage your staff lawfully and fairly.
The right approach depends on the severity, impact, and context of the breach.
When Is It Misconduct vs Serious Misconduct?
There’s no single definition that fits every workplace, but generally:
- Misconduct may include carelessness, one-off mistakes, or failure to follow a process (especially where harm is limited).
- Serious misconduct may include deliberate disclosure, reckless handling of sensitive information, dishonesty during the investigation, or conduct causing significant harm.
Be cautious about labels - what really matters is whether your decision-making process and outcome are reasonable in the circumstances.
Consider Practical Outcomes (Not Just Punishment)
Sometimes the best response is not purely disciplinary. Depending on what happened, practical solutions might include:
- targeted retraining for the employee (and broader refresher training for the team)
- tightening access controls or approval workflows
- updating email practices (for example, requiring double-checking recipient lists or using secure links)
- introducing clearer document naming and storage rules
- updating confidentiality clauses and policies for future hires
Imagine this: a staff member forwards a spreadsheet internally, not realising it contains a hidden tab with customer contact details. If your systems make it easy to accidentally share sensitive data, your “fix” shouldn’t stop at disciplining one person - it should include improving the process.
Don’t Forget Contractors, Temps And External Parties
Confidentiality breaches aren’t always caused by employees. Contractors and service providers often have access to your systems, branding, and customer data.
If you engage contractors regularly, it’s worth checking that your contractor arrangements and confidentiality documents actually match what you share with them in practice. A properly drafted Non-disclosure agreement can be a simple but powerful layer of protection.
Protect Your Business Relationships At The Same Time
While you’re managing the internal situation, you may also need to maintain trust externally.
Depending on the breach, you might need to:
- respond to customer complaints quickly and consistently
- communicate with suppliers if their information was disclosed
- make sure staff are not discussing the issue inappropriately
- prepare a clear internal message to prevent rumours and misinformation
This is where having a strong Workplace Policy can make life easier - it gives you a framework for expectations around communication, confidentiality, and conduct.
Key Takeaways
- A confidentiality breach at work can include accidental disclosures (wrong email, poor access controls) as well as deliberate misuse of sensitive information.
- Your legal duties can involve both employment obligations (good faith and fair process) and privacy obligations (reasonable security safeguards, and potentially notification under the Privacy Act 2020 where “serious harm” is likely).
- Strong legal foundations reduce risk: clear confidentiality clauses in an Employment Contract, appropriate Non-disclosure agreement use, and practical internal rules in a Workplace Policy.
- Prevention is usually a mix of documents and systems: limit access, train staff, control devices/logins, and document processes.
- If a breach occurs, act quickly but calmly: contain the issue, preserve evidence, assess what data was involved, consider notifications (which are context-dependent), and run a fair investigation.
- A written data breach response plan can save time and reduce mistakes when something goes wrong.
If you’d like help putting the right confidentiality protections in place (or responding to a confidentiality breach at work), you can reach us at 0800 002 184 or team@sprintlaw.co.nz for a free, no-obligations chat.


