Type to search

Legislation & Policy

The 72-Hour Rule: What NDPA and GDPR Say About Data Breaches

Share
Data Breach Notification

In today’s data-driven world, data breaches are no longer rare—they’re inevitable. From phishing attacks to insider mistakes, personal data can easily fall into the wrong hands. When that happens, how an organization handles breach notifications can mean the difference between swift recovery and serious legal or reputational damage.

Both the Nigeria Data Protection Act (NDPA 2023) and the European Union’s General Data Protection Regulation (GDPR) have strict obligations on how and when data controllers and processors must report data breaches.

This article breaks down, step-by-step, how to handle data breach notifications under NDPA and GDPR, with real-world insights, compliance best practices, and key differences between both frameworks.

What Is a Data Breach?

A data breach occurs when personal data is accessed, disclosed, altered, or destroyed without proper authorization — whether intentionally or accidentally.

Common Examples

TypeDescriptionExample
Unauthorized AccessWhen someone gains access without permission.Hacker infiltrates customer database.
Accidental DisclosureData is shared with the wrong recipient.Employee emails client list to the wrong person.
Data LossInformation is lost or destroyed.Laptop containing personal files is stolen.
System IntrusionAttackers exploit software vulnerabilities.Malware steals users’ financial information.

Even minor incidents can trigger breach notification requirements if personal data is involved.

Why Data Breach Notification Matters

Timely and transparent notification is vital for:

  • Protecting affected individuals from identity theft, fraud, or harm.
  • Maintaining public trust and transparency.
  • Meeting legal obligations under privacy laws.
  • Avoiding heavy penalties — under GDPR, fines can reach €20 million or 4% of annual global turnover, while NDPA sanctions can include financial penalties and enforcement orders.

Data Breach Notification Under GDPR

1. Notification Timeline

Under Article 33 of the GDPR, data controllers must:

  • Notify the supervisory authority within 72 hours of becoming aware of a personal data breach.
  • If notification is delayed, reasons must be provided.
  • If the breach is likely to result in high risk to individuals, notify affected persons without undue delay.

2. Content of the Notification

The report to the supervisory authority must include:

  • Nature of the breach (including data categories and records affected).
  • Contact details of the Data Protection Officer (DPO).
  • Likely consequences of the breach.
  • Measures taken or proposed to address the breach.

3. When You Don’t Need to Notify Individuals

If the breached data was encrypted or rendered unintelligible to unauthorized parties, or if the risk to individuals is low, direct notification may not be required.

Data Breach Notification Under NDPA

The Nigeria Data Protection Act (NDPA 2023) establishes similar obligations, with contextual differences for Nigerian organizations.

1. Notification Timeline

According to Section 40 of the NDPA, data controllers and processors must:

  • Notify the Nigeria Data Protection Commission (NDPC) of a breach within 72 hours after becoming aware.
  • Notify affected data subjects if the breach poses a real risk of harm.

2. Content of Notification

The NDPC expects the notification to include:

  • Description of the nature of the breach.
  • Type and volume of data affected.
  • Contact information of the organization or DPO.
  • Likely impact and risk assessment.
  • Measures taken or planned to mitigate the impact.

3. Affected Individuals Notification

Data subjects should be informed in clear and plain language, explaining:

  • What happened.
  • What information was affected.
  • Steps they can take to protect themselves.
  • How the organization is responding.

GDPR vs NDPA: Key Differences in Breach Notification

RequirementGDPRNDPA (Nigeria)
Supervisory Authority NotificationTo local Data Protection Authority (e.g., ICO, CNIL, etc.)To the Nigeria Data Protection Commission (NDPC)
TimelineWithin 72 hours of awarenessWithin 72 hours of awareness
Individual NotificationRequired if breach likely to cause high riskRequired if breach poses a real risk of harm
ExemptionEncrypted or low-risk dataEncrypted or low-risk data
Penalty for Non-ComplianceUp to €20 million or 4% of global turnoverFines, enforcement orders, and potential prosecution
Reporting LanguageCountry-specific DPA languageEnglish (official NDPC format)

How to Handle a Data Breach Step-by-Step

Step 1: Detect and Contain

  • Isolate affected systems.
  • Disable compromised accounts or credentials.
  • Activate your incident response plan immediately.

Step 2: Assess the Breach

  • Identify what data was affected.
  • Determine the scope, cause, and risk of the breach.
  • Classify severity (e.g., low, medium, high).

Step 3: Notify the Appropriate Authorities

  • Report to the supervisory authority (GDPR) or NDPC (NDPA) within 72 hours.
  • Maintain proof of submission and details of communication.

Step 4: Notify Affected Data Subjects

If there’s a high risk of harm, communicate clearly with the affected individuals:

  • Be honest and transparent.
  • Provide advice on how they can protect themselves.
  • Offer support channels or dedicated help lines.

Step 5: Document Everything

Keep detailed records of:

  • The breach timeline and response.
  • Decisions made and justifications.
  • Follow-up actions and mitigation efforts.

Step 6: Review and Prevent Future Incidents

  • Conduct post-incident analysis.
  • Update security measures and employee training.
  • Review data retention and protection policies.

Real-Life Example: British Airways Data Breach

In 2018, British Airways suffered a cyberattack affecting over 400,000 customers. The UK Information Commissioner’s Office (ICO) fined the airline £20 million for failing to protect personal data.

The case underscored a vital lesson — early detection, transparent communication, and timely reporting are non-negotiable for compliance under both GDPR and NDPA frameworks.

FAQs

Q1. Who must report a data breach under NDPA or GDPR?
The data controller bears primary responsibility for notifying the authority and affected individuals. Processors must inform controllers promptly.

Q2. What happens if I fail to report within 72 hours?
Late or non-reporting can result in fines, enforcement orders, and reputational damage.

Q3. Do small organizations have to report breaches?
Yes. All entities processing personal data are required to report breaches that pose risks to data subjects.

Q4. What if the breach only affects a few individuals?
If the risk is low, documentation is still mandatory — but public or individual notification may not be required.

Q5. Can NDPC or EU authorities publish details of my breach?
Yes. For public accountability, regulators may disclose major breaches or enforcement actions.

Conclusion

Data breaches are not just IT problems — they are legal and reputational challenges that demand immediate, transparent action.

Under both NDPA and GDPR, organizations must act quickly: detect, assess, report, and mitigate. By establishing robust response procedures and understanding notification requirements, you protect not only your organization but also the trust of your customers.

In privacy compliance, speed, honesty, and preparedness are your best defenses.

Tags:
Ikeh James Certified Data Protection Officer (CDPO) | NDPC-Accredited

Ikeh Ifeanyichukwu James is a Certified Data Protection Officer (CDPO) accredited by the Institute of Information Management (IIM) in collaboration with the Nigeria Data Protection Commission (NDPC). With years of experience supporting organizations in data protection compliance, privacy risk management, and NDPA implementation, he is committed to advancing responsible data governance and building digital trust in Africa and beyond. In addition to his privacy and compliance expertise, James is a Certified IT Expert, Data Analyst, and Web Developer, with proven skills in programming, digital marketing, and cybersecurity awareness. He has a background in Statistics (Yabatech) and has earned multiple certifications in Python, PHP, SEO, Digital Marketing, and Information Security from recognized local and international institutions. James has been recognized for his contributions to technology and data protection, including the Best Employee Award at DKIPPI (2021) and the Outstanding Student Award at GIZ/LSETF Skills & Mentorship Training (2019). At Privacy Needle, he leverages his diverse expertise to break down complex data privacy and cybersecurity issues into clear, actionable insights for businesses, professionals, and individuals navigating today’s digital world.

  • 1

You Might also Like

Leave a Reply

Your email address will not be published. Required fields are marked *

  • Rating

This site uses Akismet to reduce spam. Learn how your comment data is processed.