octobre 24 2025

Capita Cyber Security Breach – £14 Million Fine Issued

Share

The Information Commissioner’s Office (“ICO”) has imposed a £14 million fine on Capita for infringements of the UK General Data Protection Regulation (“UK GDPR”) relating to a cyber security incident suffered by Capita in 2023.

What happened?

In March 2023, Capita, a provider of professional services including pensions administration services, suffered a cyber security incident. An unauthorised person or persons (“threat actor”) gained access to Capita’s systems and removed data relating to over 6.6 million individuals, including data held by over 300 pension schemes. The threat actor subsequently deployed ransomware onto Capita’s systems and reset all user passwords, preventing Capita staff from accessing their systems and network.

As of September 2025, the ICO had received 93 complaints relating to the incident. High Court proceedings have also been brought against Capita on behalf of 3,973 claimants, although no amount of damages has been specified to date (see here).

What infringements did the ICO identify?

Following its investigation into the incident, the ICO concluded that Capita had breached its obligations under Article 32 of the UK GDPR to process personal data in a manner that ensures the security of that data and to implement appropriate technical and organisational measures to respond effectively to the incident. In particular, Capita had:

  • Failed to prevent a single point of access expanding. Some accounts had administrative levels of access and control, even where this was not necessary. This allowed the threat actor to escalate privileges (granting more access and control to the compromised accounts), move laterally across multiple domains to access other data or parts of the network and compromise critical systems. This had been flagged as a vulnerability on at least three separate occasions prior to the incident but had not been remedied.
  • Failed to respond appropriately to security alerts. Although a high priority security alert was raised within ten minutes of the initial breach by the threat actor, Capita took 58 hours to respond appropriately, against Capita’s target response time of one hour. Its Security Operations Centre was understaffed and, in the six months before the incident, fell well below the target response times for responding to security alerts.
  • Conducted inadequate penetration testing and risk assessment. Systems processing millions of records, including some sensitive data, were only subject to a penetration test upon being originally implemented and were not subject to any subsequent or regular penetration testing. In addition, findings from penetration tests were siloed within business units and risks identified that affected the wider Capita network were not universally addressed.

How did the ICO calculate the fine?

Initially, the ICO proposed a fine of £45 million. However, having considered representations from Capita, the ICO and Capita agreed a voluntary settlement under which Capita will pay a fine of £14 million and waive its right to appeal that fine.

What practical steps can pension schemes take?

In light of the comments and statements from the ICO, trustees of pension schemes in the UK may wish to consider:

  • Following the National Cyber Security Centre (“NCSC”)’s guidance on preventing unintended (lateral) movement of data and files (which includes protecting credentials, deploying good authentication practices, protecting high profile accounts and locking down devices, amongst others) and ensuring that the “principle of least privilege’“ is applied across the organisation i.e. that administrative level privileges and access are only granted where strictly necessary. The NCSC guidance was specifically referred to by the ICO.
  • Regularly monitoring for suspicious activity and responding to initial warnings and alerts in a timely manner.
  • Implementing regular penetration testing and risk assessments and sharing the findings from penetration testing with scheme employers so risks can be universally addressed.
  • Prioritising investment in key security controls to ensure that they are operating effectively.
  • Checking agreements with data processors (such as IT service providers or administrators) are up to date and set out information security and data protection responsibilities between the parties.

In considering the above, trustees will need to discuss and assess what arrangements they currently have in place with their scheme administrators and take advice as appropriate. They may also wish to leverage the technical expertise and resources of the scheme’s employer(s), including participating in trainings or demonstrations.

When determining the level of fine to impose, the ICO took into account a number of mitigating factors which served to reduce the fine, including:

  • Improvements made by Capita to its cyber security controls after the incident.
  • Support offered by Capita to affected individuals, including free credit monitoring for 12 months and appointment of a third party to monitor the dark web.
  • Capita’s engagement with other regulators, including it voluntarily informing the NCSC of the incident.
  • Capita’s admission of liability regarding the infringements – although the ICO noted that the reduction it applied to reflect this admission would have been higher had Capita made that admission before the ICO notified Capita of its intent to issue a fine of £45 million.

These give an indication of the types of action that trustees or administrators can take in the event of a cyber incident to mitigate impacts and demonstrate a robust incident response protocol to a regulator.

How can Mayer Brown help?

The Capita data breach has highlighted the importance for pension scheme trustees and administrators to ensure their data protection and information security arrangements are robust, both internally and with third-party suppliers.

We can assist by:

  • Reviewing and updating data protection provisions in supplier and consultant agreements to ensure they provide appropriate protection and clear obligations in the event of a breach.
  • Advising on supplier and consultant contracts more generally, ensuring appropriate governance, risk allocation and compliance measures are in place.
  • Supporting clients in responding to data breaches or cyber incidents, including managing urgent regulatory notifications and communications with affected members.
  • Conducting reviews of internal data protection policies and processes, identifying gaps and recommending practical improvements.
  • Providing training/knowledge sessions and cyber wargames.

For more information on how we can help, please contact the authors.

Compétences et Secteurs liés

Stay Up To Date With Our Insights

See how we use a multidisciplinary, integrated approach to meet our clients' needs.
Subscribe