Alex is Sprintlaw’s co-founder and principal lawyer. Alex previously worked at a top-tier firm as a lawyer specialising in technology and media contracts, and founded a digital agency which he sold in 2015.
Most New Zealand small businesses rely on technology every day - email, cloud storage, online banking, eCommerce, booking platforms, and digital marketing. That convenience is great for growth, but it also means cybersecurity isn’t “just an IT problem” anymore.
If your systems are hacked, your customer list is leaked, or you accidentally send an invoice to the wrong person, the consequences can be commercial and legal. You might face downtime, lost revenue, reputational damage, contractual disputes, and (in some cases) complaints or regulatory action under the Privacy Act 2020.
This guide breaks down what business cybersecurity means in practice for SMEs, what legal obligations you should have on your radar, and the simple steps you can take to reduce risk and show you’re acting responsibly.
Why Cybersecurity Matters For SMEs (Not Just Big Companies)
It’s a common assumption that “hackers only go after the big players”. In reality, SMEs are often targeted because they can be easier to access - fewer controls, less formal training, and less time to patch and update systems.
From a legal and risk perspective, cybersecurity matters because it affects:
- Customer trust (especially if you hold personal information like addresses, phone numbers, or payment details)
- Your ability to operate (ransomware, locked files, and system outages can stop a small business overnight)
- Your contracts and relationships (customers and suppliers may expect you to protect confidential information)
- Your legal compliance (particularly privacy obligations under the Privacy Act 2020)
Even if you don’t think you “collect much data”, you probably hold personal information somewhere - for example in your email inbox, your accounting software, your CRM, or even just a spreadsheet.
And if you run an online business, cybersecurity ties directly into what you promise customers through your website and your customer communications (including whether your Website Terms And Conditions match how you actually operate).
What Legal Obligations Apply To Cybersecurity In New Zealand?
New Zealand doesn’t have one single “Cybersecurity Act” that applies to all businesses. Instead, your obligations typically come from a mix of privacy law, contract law, and general business risk management.
Privacy Act 2020 (Personal Information And Data Breaches)
If your business collects, uses, stores, or discloses personal information, the Privacy Act 2020 will often be relevant. Personal information is broadly information about an identifiable individual - like a customer name, email address, phone number, or delivery address. Some technical data (such as IP addresses) can also be personal information where it identifies, or could reasonably identify, an individual in context.
In plain terms, privacy law expects you to:
- only collect personal information you actually need
- store it securely
- only use it for proper purposes
- avoid unauthorised access, loss, or disclosure
- be open and transparent about what you do with it (usually via a Privacy Policy)
Importantly, the Privacy Act includes a notifiable privacy breach regime. That means some data breaches need to be notified to the Office of the Privacy Commissioner (and sometimes to affected individuals) if the breach is likely to cause serious harm.
Having a plan ready makes a huge difference in a stressful moment - many businesses document this in a data breach notification process so the team isn’t making it up on the fly.
Contract Law (What You Promised Customers, Suppliers, And Partners)
Your contracts can create cybersecurity and data-handling obligations even when the law is broad or flexible.
For example, your agreement with a corporate customer might say you must:
- keep their information confidential
- notify them immediately of any security incident
- only use approved systems or subcontractors
- meet specific security standards (sometimes industry or client-specific requirements)
If a cyber incident happens and you’ve breached those obligations, you may face claims for loss, termination of the relationship, or a dispute about who pays for what. This is one reason it’s worth making sure your core customer and supplier documentation is fit for purpose - for example, an appropriately drafted Service Agreement can help set clear expectations around security, access, responsibility, and liability.
Employment And Workplace Obligations (People Are Part Of Security)
Many cybersecurity incidents start with human behaviour - clicking a phishing link, using weak passwords, or sending information to the wrong person.
From a business perspective, it helps to be able to point to clear internal rules, training, and reasonable monitoring. Policies won’t stop every incident, but they do show you’re taking your obligations seriously and give you a framework to respond if something goes wrong.
Depending on how your team works, that might include an Acceptable Use Policy (covering devices, passwords, email, and acceptable system use) and a documented Information Security Policy (covering access controls, retention, incident response, and governance).
Common Cybersecurity Legal Risks For Small Businesses (And How They Happen)
When we talk about cybersecurity for businesses, most SME owners picture “a hacker breaking in”. That can happen - but a lot of real-world risk comes from more ordinary scenarios that still create legal exposure.
1) Phishing And Business Email Compromise
A staff member receives an email that looks like it’s from your bank, your accountant, or a supplier. They enter login details, or they approve a payment to a changed bank account.
Risks can include:
- direct financial loss (misdirected payments)
- unauthorised access to customer or employee data
- disputes about who is responsible for the loss (you, the bank, the supplier, or the staff member)
2) Ransomware And Operational Shutdown
Ransomware can lock your files, stop your point-of-sale system, or take your booking platform offline. Even if you don’t pay a ransom, downtime can be extremely expensive for a small business.
From a legal angle, this can trigger:
- breach of contract claims (missed deadlines, inability to provide services)
- privacy breach obligations (if data is accessed or exfiltrated)
- business continuity issues (which can then create further commercial disputes)
3) Accidental Disclosure (The “Oops” Data Breach)
Not every breach is malicious. Some are simple mistakes, like:
- sending a spreadsheet to the wrong email address
- leaving customer details in a shared folder with open permissions
- using CC instead of BCC for a customer email list
- losing an unencrypted device (laptop, phone, USB)
These incidents can still be notifiable under the Privacy Act 2020, depending on the risk of serious harm, and they can still damage customer trust.
4) Third-Party Software And Outsourced Providers
Most SMEs use third-party tools - cloud accounting, marketing platforms, booking systems, payment processors, and IT support providers. That’s normal.
The catch is: even if a vendor caused the issue, your business may still be the organisation customers complain about (because you collected the data in the first place).
This is why vendor due diligence and contract terms matter - including who must notify whom, timeframes, and what support you’re entitled to during an incident.
Practical Cybersecurity Steps SMEs Can Take (Without Overcomplicating It)
You don’t need an enterprise-level security program to materially reduce risk. For most SMEs, cybersecurity is about getting the fundamentals right and being consistent.
Step 1: Map What Data You Hold And Where It Lives
Start with a simple audit:
- What personal information do you collect (customers, employees, contractors)?
- Where is it stored (email, cloud storage, CRM, accounting software, local computers)?
- Who has access?
- How long do you keep it?
This makes it much easier to identify your highest-risk areas and to write accurate privacy disclosures.
Step 2: Put Clear Rules In Place For Your Team
Most SMEs don’t have problems because staff are careless - they have problems because staff were never told what “good practice” looks like.
Common rules you can standardise include:
- multi-factor authentication (MFA) for email and key systems
- password manager use (and no password sharing)
- how to handle suspicious emails and invoices
- how to store and share customer documents
- who to report incidents to internally
For many businesses, this is captured in an Acceptable Use Policy and supporting security documentation (for example an Information Security Policy) so expectations are clear and enforceable.
Step 3: Prepare A Simple Incident Response Plan
When something goes wrong, you want to avoid panic decisions (like deleting evidence, emailing customers too early, or missing a legal notification requirement).
A practical incident plan usually covers:
- how to identify and contain the issue (including who has authority to shut down access)
- who to contact (IT provider, internal lead, legal adviser, insurer, bank)
- how to preserve logs and evidence
- how to assess whether it’s a notifiable privacy breach
- how to communicate with customers and partners
Even a lightweight documented workflow can help - particularly if it aligns with a data breach notification process.
Step 4: Review Insurance And Business Continuity
Cyber insurance isn’t a legal requirement, but it can be a commercial safety net (depending on your operations). Business continuity planning also matters - like having offline backups and a plan to invoice customers if your systems are down.
The key is to avoid assumptions. If you have insurance, check what it actually covers, what notifications you must make, and what security controls are required for your policy to respond.
Step 5: Be Careful With AI Tools And Data Sharing
Many SMEs now use AI tools for drafting, customer support, marketing, and summarising documents. Used properly, it can be a productivity boost. Used carelessly, it can create confidentiality and privacy issues.
A practical rule is: don’t paste sensitive customer information, employee information, passwords, or confidential business documents into tools unless you’ve assessed the privacy and security implications and have a clear internal policy.
Some businesses formalise this with a Generative AI Use Policy to set boundaries and reduce the chance of accidental disclosures.
What Legal Documents Should Support Your Cybersecurity?
Cybersecurity often fails in the gap between “what we do” and “what we documented”. Having the right documents doesn’t replace good security - but it does help you prove you’re acting responsibly, communicate clearly, and reduce disputes when incidents happen.
Here are some documents SMEs commonly use to strengthen cybersecurity and legal compliance.
Privacy Policy And Privacy Notices
If you collect personal information online (or even just via email enquiries), you should have a clear Privacy Policy explaining what you collect, why, how you store it, and who you share it with.
This is also a practical trust signal for customers - and it forces you to be clear internally about your own processes.
Information Security Policy And Acceptable Use Policy
Policies help reduce human error and show you’ve taken reasonable steps to protect information.
- An Information Security Policy usually covers access controls, data handling, incident response, retention, and governance.
- An Acceptable Use Policy usually covers staff use of devices, email, passwords, remote work, and what happens if someone breaches the rules.
If you’re introducing these policies into an existing team, make sure you roll them out properly - explain them, train staff, and align them with your day-to-day operations. A policy nobody follows won’t help you much.
Customer And Supplier Contracts (Including Security Responsibilities)
If you provide services that involve customer data - like marketing, web development, accounting support, admin, consulting, health services, or subscription platforms - it’s smart to include clear terms about:
- confidentiality and data handling
- security measures (at a “reasonable steps” level, unless a client requires something more specific)
- incident notification timelines
- limitations of liability (where appropriate and enforceable)
Often, this is handled through a properly drafted Service Agreement or terms and conditions. For online sales, your Website Terms And Conditions should also match your actual processes (for example, how you deliver digital products, how accounts are secured, and how you handle outages).
Software Licensing And System Access Documentation
If you license software, provide access to a platform, or give customers logins, consider whether you need terms that address security-related behaviour (like password sharing, unauthorised access attempts, or abuse of accounts).
Depending on your model, a Software Licence Agreement can help clarify usage rights, restrictions, support obligations, and what happens if there’s a security incident affecting service availability.
Data Breach Response And Notification Process
When a breach happens, speed and structure matter. A documented response plan can help you:
- triage what happened
- reduce further harm
- comply with Privacy Act notification requirements (where applicable)
- communicate consistently with customers and partners
This is often supported by a Data Breach Notification workflow and internal templates.
As always, the right documents depend on what your business does, what data you hold, and what your customers expect - so it’s worth getting advice tailored to your specific setup rather than relying on generic templates.
Key Takeaways
- Cybersecurity is a legal and commercial issue for SMEs, not just a technical one - a breach can trigger downtime, reputational damage, and contractual disputes.
- The Privacy Act 2020 will often apply where you collect, use or hold personal information, and some breaches may be notifiable if they’re likely to cause serious harm.
- Contracts can create cybersecurity obligations (like confidentiality, incident notification, and security standards) even where the law is broad, so it’s important your agreements match how you operate.
- Many incidents come from everyday mistakes like phishing, misdirected emails, weak passwords, and unsecured shared folders - staff training and clear policies reduce these risks.
- Practical steps like MFA, data mapping, access controls, backups, and incident response planning can materially improve your cybersecurity without enterprise complexity.
- Documents like a Privacy Policy, Acceptable Use Policy, Information Security Policy, and well-drafted customer terms help set expectations, support compliance, and reduce disputes when something goes wrong.
Note: This article is general information only and not legal advice. If you need advice on your specific circumstances, speak to a lawyer.
If you’d like help tightening up your legal protections around cybersecurity - including privacy compliance, incident response planning, and contract terms - you can reach us at 0800 002 184 or team@sprintlaw.co.nz for a free, no-obligations chat.


