Inner Hero banner Image

Data Protection

Key anticipated events

June

    June

    2026

    • Phased implementation principally from June 2025 to June 2026: Implementation of Data (Use and Access) Act 2025

     

    Throughout

    2026

    • Enactment of The Cyber Security and Resilience (Network and Information Systems) Bill

     

Legislation

Data Use and Access Act 2025

The Data Use and Access Act 2025 (DUAA) marks a significant evolution in the UK’s data protection landscape. Building on the foundations of the UK GDPR, the Data Protection Act 2018, and the Privacy and Electronic Communications Regulations (PECR), the DUAA introduces targeted reforms aimed at balancing innovation with robust privacy safeguards.

The DUAA reflects the Government’s ambition to position the UK as a global leader in data-driven innovation, while maintaining high standards of privacy and security. It also aligns with international trends, including the EU’s Data Act, though with notable UK-specific differences. The DUAA also strikes an important balance between fostering growth and innovation on the one hand, with the maintenance of high data protection and data privacy legal standards on the other. This is important, as the UK needs to demonstrate that its data laws are essentially equivalent to those of the EU to be deemed ‘adequate’ to receive frictionless flows of personal data from the EU.

The DUAA received Royal Assent in June 2025 and is being phased in during 2026. It does not replace existing data protection laws but introduces reforms to:

  • simplify compliance for organisations
  • enable responsible data sharing and innovation
  • strengthen enforcement and regulatory oversight

The DUAA introduces several important changes that will reshape compliance strategies, which we summarise below.

Increased powers to fine under PECR

The DUAA increases fines for breaches of e-Privacy rules. It does so by increasing the current fine ceiling under PECR to align with the UK GDPR regime. This means an increase in potential fines from a current maximum of £500,000 to £17,500,000/4% of turnover for the most egregious infringements. Whilst this change ‘tidies up’ the current disparity between the two regimes, it emphasises the importance for organisations of complying with obligations in relation to electronic direct marketing and other activities regulated by PECR. It remains to be seen how the Information Commission exercises this new fining power. We recommend that organisations who rely heavily on electronic direct marketing and cookies for marketing and advertising monitor the Information Commission’s output for future guidance on regulatory policy and enforcement actions in this area.

Automated decision-making (ADM)

The restrictions on use of ADM are relaxed - to a limited extent. The former restriction on use of ADM for making significant decisions about people without human involvement has been removed. Instead, it now only applies to significant decisions involving (even partly) special category personal data.

Organisations will also be able to rely on broader lawful bases to justify their use of ADM than previously, such as recognised legitimate interests. This is a welcome change for organisations, as legitimate interests is a more flexible basis for processing than obtaining an individual’s consent.

The DUAA will introduce certain mandatory safeguards on use of ADM, such as requirements to inform impacted individuals that ADM is taking place and provide them with rights to make representations, obtain human review, and contest significant decisions.

Whilst the DUAA relaxes the previous law in this area, its reforms are subtle. We recommend that organisations continue to take care in their use of ADM (and the new opportunities offered by the DUAA).

Recognised legitimate interests

Where an organisation relies on ‘legitimate interests’ to process personal data, it is normally required to identify the legitimate interest and undertake a high-level balancing test against the rights and interests of data subjects. The DUAA introduces a statutory category of ‘recognised legitimate interests’, removing the need for a balancing test for certain purposes, including:

  • fraud prevention
  • public security
  • intra-group data transfers; and
  • direct marketing

The intention behind this reform is to simplify compliance for routine processing activities and reduce administrative burden while maintaining accountability.

Data Subject Access Requests (DSARs)

We have seen a rising tide of organisations receiving DSARs from individuals, particularly as an information-gathering tool in disputes. The DUAA provides some ‘light relief’ by codifying an organisation’s responsibility to do a ‘reasonable and proportionate’ search for personal data. This will be helpful to organisations faced with potentially extensive and onerous search requests from individuals who are reluctant to narrow down their request scope to more reasonable and proportionate parameters.

Data subject complaints

The DUAA requires organisations to implement procedures for handling data privacy complaints from individuals. Organisations are obliged to acknowledge complaints within 30 days and must, without undue delay, take appropriate steps to deal with the complaint (including making any appropriate enquiries and updating on progress) and inform the individual of the outcome.

International transfers

The DUAA recognises that cross-border data flows are a crucial part of international commerce. Again, it introduces a subtle shift from the current law to facilitate commercial activity between parties located in different territories. The Government sets a new test to decide whether a third country in which a transferee is located is ‘adequate’ to receive frictionless transfers of personal data from the UK. Whereas before it had to determine whether the third country’s laws were ‘essentially equivalent’ to the UK’s; now the test is whether that country’s laws are ‘not materially lower’ than UK standards.

Cookies and marketing

The DUAA also relieves a bit of the compliance burden on businesses that use website cookies. It now provides an exception to the need for website operators to obtain prior opt-in consent for non-essential cookies. This exception covers cookies whose sole purpose is to collect information for statistical purposes about how an online service or website is used with a view to making improvements.

It is still necessary for a website operator to:

  • provide privacy information to website users in respect of such cookies; and
  • provide an ‘opt-out’ to users in relation to the placing of such cookies

Whilst this change eases some regulatory ‘friction’ for organisations, we refer to our comments above regarding the Information Commission’s increased powers to fine where use of cookies is non-compliant with PECR.

Children’s data

The DUAA strengthens protections for children’s personal data, embedding privacy by design principles. Organisations offering online services likely to be used by children must review age-appropriate design measures and parental consent mechanisms.

The Information Commission

The DUAA replaces the Information Commissioner’s Office with the Information Commission, giving it a more ‘corporate’ structure. The newly minted Information Commission will get enhanced powers, including the ability to compel witness attendance and request technical reports and an expanded authority to issue GDPR-level fines for PECR breaches (as noted above).

Implications for businesses

Implications for businesses

Whilst it is not a radical overhaul of UK data protection law, the DUAA will impact most organisations to at least some extent. Organisations should consider the legislation to determine whether its relaxation of certain rules provides them with opportunities to develop their data processing and foster growth. However, they should also be mindful of new obligations and (as regards PECR) potentially greater consequences for infringing privacy law.

Actions for businesses to consider

The DUAA introduces both opportunities and challenges. Businesses should monitor official updates and prepare for staged compliance obligations. Legal and compliance teams should prioritise the following actions:

Further details

The Information Commission is currently updating its guidance notes to take account of the DUAA. For further details you can visit the ICO website here.

Government to counter rising tide of cyber threats to UK network and information systems with Cyber Security and Resilience (Network and Information Systems) Bill

Last year, the UK was the most targeted country in Europe for cyber-attacks, with over 600,000 organisations being targeted. The Cyber Security and Resilience (Network and Information Systems) Bill (the Bill) was introduced to Parliament on 12 November 2025, following its announcement in the King’s Speech (July 2024). It represents the most significant overhaul of the UK’s cybersecurity framework since the NIS Regulations 2018, aligning with the EU’s NIS2 Directive while introducing UK-specific measures.

The UK’s current cyber resilience law is the 2018 NIS Regulations (NIS Regs). The NIS Regs derive from the EU NIS Directive and are therefore a ‘hangover’ from pre-Brexit days. The EU has since moved on with new legislation to counter cyber threats, in the shape of the NIS 2 Regulations. The Government recognises that the NIS Regs are out of date and insufficient to deal with the growing wave of cyber threats that the UK faces. 

The Bill would include new laws to strengthen cyber defences for essential public services like healthcare, digital infrastructure, drinking water providers, transport and energy. Perhaps unsurprisingly, its approach aligns quite closely with the NIS 2 Regulations. 

The Bill builds upon the current obligations of regulated entities to report cyber incidents. An in-scope entity will have to report incidents that are:

  • capable of having a significant impact on the provision of an essential or relevant digital service; and
  • that significantly affect the confidentiality, availability, authenticity and integrity of a system provided by a regulated entity

The entity will need to follow a two-step reporting procedure. The first step involves notifying their regulator of a significant security incident no later than 24 hours after becoming aware, followed by an incident report within 72 hours. In addition, Data Centre OESs will be required to notify where aware a data centre incident has occurred or is occurring. Where they experience a significant incident, they will also be required to alert customers affected by the incident.

Enforcement of the Bill would be entrusted to a dozen regulators, including the Information Commission, Ofcom and The Department for Science, Innovation and Technology (DSIT). The Secretary of State would issue a Code of Practice and set out a Statement of Strategic Priorities regarding the security and resilience of network and information systems. The regulators would pay regard to these. The regulators themselves will get enhanced enforcement and information gathering powers.

Secondary legislation and Codes of Practice are expected in early 2026, providing detailed compliance obligations and sector-specific guidance.

Implications for businesses

Implications for businesses

The regime does not cover every UK organisation. Instead, it focuses its attention on those services which are so essential, that their disruption would affect people’s daily lives in the UK.

The current legislation already covers services like the NHS, transport system and energy network. The Bill recognises that cyber criminals are now threatening a broader range of services upon which the wider UK economy relies. As such, the following types of service would be brought within the scope of the proposed legislation:

  • Data centres: The Bill would class these as essential services. Medium and large data centres and enterprise data centres meeting the thresholds will be required to have appropriate and proportionate measures in place to manage risks
  • Managed service providers: These service providers have extensive access to their customers’ IT systems, which makes them an attractive target for cyber criminals. Again, medium and large providers will come into scope
  • Large load controllers: These entities manage electrical load for smart appliances, such as supporting electric vehicle (EV) charging during peak times. The Bill brings them into scope in order to prevent disruption to the grid
  • Designated critial suppliers: Regulators will be able to designate the most important suppliers to essential and digital services as being ’critical suppliers’ that are subject to the regulatory regime

Unsurprisingly, the Bill would underpin these enhanced requirements with a beefed-up set of sanctions for non-compliance. It includes a ‘standard maximum amount’ of penalties of £10 million or 2% of the undertaking's turnover (both inside and outside the United Kingdom), whichever is greater; in any other case, it's £10 million. Next, there is a ‘higher maximum amount’, which is the greater of £17 million or 4% of the undertaking's turnover (both inside and outside the United Kingdom); and in any other case, £17 million. Penalties for non-compliance with national security directions can be up to £17 million, or where regulations are in force, the greater of £17 million and 10% of the turnover of the undertaking (both inside and outside the United Kingdom).

Actions for businesses to consider

The Bill is currently at the first reading stage in Parliament, so it’s relatively early days in its legislative journey. Organisations should monitor its progress with the assumption it will enter force during the course of 2026.

Once the Bill is in force, the Government intends to implement it in phases. Some parts (regarding future-proofing and post-implementation review) will come into force on Day 1. Elements regarding information sharing and statement of strategic priorities will be implemented from Month 2 following enactment. Other elements (for example, in relation to data centres and incident response) will be brought in via secondary legislation. The measures coming into force via secondary legislation will be those that require further detail to be implemented and operationalised.

We recommend that Chief Information Security Officers do the following:

Further details

For further details you can visit the DSIT section of the Government website here.

Key contacts

Luke Dixon's Profile

Luke Dixon

Partner & Head of Data & Information

Get in touch

Contact us today

Whatever your legal needs, our wide ranging expertise is here to support you and your business, so let’s start your legal journey today and get you in touch with the right lawyer to get you started.

Telephone

Get in touch

For general enquiries, please complete this form and we will direct your message to the most appropriate person.