Tag: GDPR for SMEs
Legitimate interests is one of the most commonly relied-on lawful bases under the UK GDPR; nevertheless, it is also one of the most commonly misapplied. In practice, it can be an entirely appropriate basis for processing personal data, particularly where the processing is expected, proportionate, and supported by sensible safeguards. However, because this basis depends on context and balancing, it only really holds up when you can demonstrate that you have assessed necessity and impact through a Legitimate Interests Assessment (LIA). The ICO’s guidance makes clear that organisations should consider when legitimate interests is appropriate and keep records that help demonstrate compliance. (ICO)
This guide explains what legitimate interests is, when it works well (and when it doesn’t), and how small businesses can produce an LIA that is structured, defensible, and aligned with their privacy notice.
Why legitimate interests matters (and why it causes problems)
Legitimate interests is attractive because it feels operationally realistic: unlike consent, it is not withdrawn on a whim, and unlike contractual necessity, it does not require every processing activity to be “strictly required” to deliver a service. However, that flexibility comes with a trade-off, because you must be able to show that your interests are not overridden by the individual’s rights and freedoms, especially where the processing is unexpected or could create a tangible risk to the individual.
Although the UK GDPR does not provide a rigid definition of what counts as a legitimate interest, the ICO notes that the concept is broad and can include straightforward commercial interests, provided your assessment and safeguards are appropriate to the processing. (ICO)
The three-part LIA test (purpose, necessity, balancing)
A robust Legitimate Interests Assessment typically follows three stages. While templates vary, the underlying logic is consistent: you identify the interest, test whether the processing is necessary, and then balance that against the individual’s interests.
1) Purpose test: What is the legitimate interest?
Start by defining the interest clearly and specifically. “Running the business” is too vague to be meaningful; by contrast, “preventing fraud on customer accounts” or “maintaining network security” is more precise, measurable, and defensible.
At this stage, you should also confirm that the interest is lawful and genuine, and that the processing is not being used to justify something that would be better supported by another lawful basis.
2) Necessity test: Is this processing necessary to achieve it?
Here, “necessary” should be understood as proportionate and targeted, rather than “no alternative exists.” In other words, you are asking whether there is a less intrusive, reasonably available way to achieve the same aim with reduced impact on individuals.
For example, if your interest is preventing automated spam submissions, limited rate-limiting and short-lived security logs may be proportionate; however, building detailed behavioural profiles of visitors for indefinite periods is unlikely to be “necessary” for that purpose.
3) Balancing test: Do the individual’s interests override yours?
This is where legitimate interests either survives scrutiny or collapses on contact with reality.
A strong balancing test typically considers:
- the nature of the data (basic identifiers vs more sensitive information);
- the relationship (customer, employee, prospect, website visitor);
- reasonable expectations (is this what people would anticipate?);
- the likely impact (financial harm, distress, exclusion, or loss of control); and
- the safeguards in place (minimisation, retention limits, opt-outs, access controls).
The ICO highlights that legitimate interests requires consideration of the impact on individuals, and that additional care is required in higher-risk contexts, such as children’s data. (ICO)
What a good LIA looks like in practice
A defensible LIA is readable, specific, and reviewable. Importantly, it should not be written as if it is trying to “win” a conclusion; instead, it should demonstrate that you have genuinely assessed whether legitimate interests is appropriate, and what mitigations are necessary to make it fair.
The ICO provides a sample LIA template that is genuinely useful as a baseline structure, particularly for SMEs trying to introduce repeatable governance without turning every decision into a legal project. (ICO)
A practical LIA record usually includes:
- a short description of the processing (what you do, whose data, where it comes from);
- the interest you are pursuing (purpose test);
- why the processing is proportionate (necessity test);
- the balancing analysis (expectations, risks, impacts);
- safeguards and mitigations;
- the outcome (proceed / proceed with changes / use another lawful basis); and
- review triggers (new tools, new purposes, new audiences, new risks).
Common pitfalls that undermine legitimate interests
Pitfall 1: Using legitimate interests as the default for everything
While legitimate interests is flexible, it is not universal. If you are forcing the assessment to “pass,” that is often a sign that the processing is too intrusive, too unexpected, or insufficiently safeguarded.
Pitfall 2: Forgetting transparency
If you rely on legitimate interests, your privacy notice should not only name the lawful basis, but also explain what the legitimate interests are and how individuals can object. The ICO’s small-organisation guidance on privacy notices is a strong reference point for the content and clarity expected. (ICO)
Notably, the ICO flags that some privacy notice guidance is under review following the Data (Use and Access) Actcoming into law on 19 June 2025, which is a helpful reminder that “set and forget” documentation rarely stays compliant for long. (ICO)
Pitfall 3: Treating the LIA as a one-off form
An LIA should be reviewed when the processing changes. For example, if you introduce new analytics tools, expand into new markets, begin using AI features, or start collecting new categories of data, your previous balancing assumptions may no longer be reliable.
Pitfall 4: Ignoring reasonable expectations
If your processing would surprise a typical person, your balancing test needs to be stronger, your safeguards tighter, and your transparency sharper. Put differently, surprise increases risk; therefore, you should either redesign the processing or choose a different lawful basis.
SME examples: where legitimate interests often works well
These are not blanket approvals; rather, they illustrate scenarios where legitimate interests is commonly relied upon, assuming the LIA supports it and safeguards are implemented.
Example A: Security logging
Purpose: prevent unauthorised access and investigate incidents Necessity: limited logging supports detection and response Safeguards: short retention, access controls, monitoring, minimised fields
Example B: Service communications and account administration
Purpose: ensure continuity of service, manage accounts, prevent fraud Necessity: basic identifiers and contact details are proportionate Safeguards: clear privacy information, retention controls, role-based access
Example C: B2B prospecting (carefully)
Purpose: business development Necessity: limited contact details for targeted outreach Safeguards: clear opt-out, restrained frequency, suppression lists, and a stronger balancing test where expectations are less clear
How to reflect legitimate interests in your privacy notice
If you are using legitimate interests, your privacy notice should explain it in plain English. A simple, readable format is often the most effective:
- Purpose: why you process the data
- Lawful basis: legitimate interests
- Our legitimate interests: the specific interest pursued
- Your choices: how to object or opt out
For guidance on what should be included and how to write it clearly, the ICO’s privacy notice guidance for small organisations is a useful reference, and its “create your own privacy notice” tool can be helpful as a starting point for SMEs. (ICO)
When to choose a different lawful basis instead
Legitimate interests is often unsuitable where the processing is unexpected, intrusive, or high impact, particularly where:
- you are processing children’s data;
- you are using special category data in ways that increase risk; or
- the processing could materially affect an individual’s opportunities, access, or treatment.
When the balancing test is strained, it is usually more effective to step back and reconsider the design of the processing itself, rather than trying to “paper over” risk with optimistic wording.
How Athlex can help
If you want legitimate interests to be defensible, you need more than a template you downloaded and forgot to tailor. You need processing-specific reasoning, a workable record, and wording that matches what you do day-to-day.
Athlex can support in a few ways:
- Outsourced DPO support (ongoing guidance, governance, and risk management). (Athlex Limited)
- Practical advisory support (including contract reviews, clause support, and compliance packages). (Athlex Limited)
Coming soon: Athlex templates built for small businesses. We’re launching a set of downloadable templates designed to be practical, plain-English, and SME-ready, including LIAs, privacy notice wording, and other essentials. They’re built to reflect real-world processing, so you can implement them quickly without the usual “generic filler” problem.
In the meantime, you may find our UK GDPR compliance checklist for small businesses a useful quick-start resource. (Athlex Limited)
Key takeaways
Legitimate interests can be a strong, flexible basis under the UK GDPR; however, it only works when you can show your reasoning. If you document your LIA properly, apply safeguards that reduce risk, and align your privacy notice with what you actually do, you are far more likely to end up with compliance that is credible rather than cosmetic.
FAQ
What is legitimate interests under UK GDPR?
Legitimate interests is a lawful basis that may allow processing when you have a genuine interest that is not overridden by the individual’s rights and freedoms, provided the processing is fair and proportionate. (ICO)
Do I need a legitimate interests assessment (LIA)?
In practice, yes. An LIA is the clearest way to document your purpose, necessity, and balancing analysis, and the ICO provides a sample template to support structured decision-making. (ICO)
Do I need to mention legitimate interests in my privacy notice?
Yes. If you rely on legitimate interests, your privacy notice should communicate that basis and explain what the interests are, using clear, accessible language. (ICO)
The UK’s data-protection landscape is evolving fast, and SMEs are now directly exposed to enforcement action once largely associated with public bodies or large multinationals. As the BDO enforcement trends analysis reviewing ICO enforcement trends 2025, highlights, the ICO is increasingly focused on fundamental compliance failures rather than technical edge cases, meaning SMEs face the same expectations as larger organisations.
To help UK SMEs stay ahead, this guide breaks down the three most prominent ICO enforcement themes in 2025 and explains how each relates directly to the core duties under UK GDPR.
ICO Enforcement Trend 1: DSAR Delays & Right-of-Access Failures
The ICO continues to treat DSAR delays as one of the most serious indicators of poor governance. This theme appears repeatedly in enforcement notices and aligns closely with the BDO analysis.
A recent example is the enforcement notice issued to South Wales Police, requiring the organisation to clear a backlog of more than 350 overdue SARs by mid-2026.
Although policing bodies sit in a unique context, the principle is identical for SMEs:
a delayed, incomplete, or mismanaged DSAR is a governance failure, not an administrative error.
Why SMEs are vulnerable
- DSAR processes are often informal or undocumented
- Staff rely on untracked shared inboxes that hamper compliance
- Manual redaction takes longer than expected and slows response times
- Identity verification checks are inconsistent or incomplete
- No clear owner is assigned to coordinate DSAR responses
Consequently, SMEs often fail “by accident”, simply because processes were never clearly built.
What SMEs should do
- Implement a formal DSAR register
- Use standardised verification templates
- Assign responsibility for triage and drafting
- Create a redaction decision record
- Test your DSAR workflow every six months
See how Athlex Data Protection can help you with your UK GDPR compliance.
To strengthen your position, Athlex Data Protection includes DSAR review as part of its Free UK GDPR Compliance Audit.
ICO Enforcement Trend 2: System Errors & Data-Accuracy Failures
While many SMEs assume breaches are caused by sophisticated threat actors, the ICO’s recent fines show that basic security failings, particularly around access control and system configuration, remain the driving force behind most incidents. This is why BDO identifies weak security controls as a recurring enforcement theme.
A clear example of this is the £3.07 million fine issued to Advanced Computer Software Group (“Advanced”), a major processor used across the UK health and education sectors.
What happened
A ransomware attack exploited several preventable vulnerabilities, including:
- inadequate access controls,
- outdated software components,
- unpatched critical systems, and
- insufficient segregation of sensitive data.
Because Advanced was acting as a data processor, the incident demonstrated that processors are not insulated from ICO enforcement. Importantly, the ICO highlighted that robust Article 32 security measures apply equally to processors and controllers — a point many SMEs overlook when relying on third-party suppliers.
Why this matters for SMEs
Many SMEs rely on external IT providers, SaaS dashboards, or outsourced infrastructure. Consequently, they often inherit a false sense of security. Yet, as the Advanced case shows:
- unpatched systems,
- misconfigured access rights, and
- weak administrator controls can create breach pathways that affect both the processorand its clients.
Furthermore, the ICO’s commentary stresses that technical misconfiguration is increasingly treated as a governance failure, not an unavoidable risk. In other words, SMEs are expected to demonstrate continuous security management – not reactive fixes after an incident.
What SMEs should do now
To reduce exposure to similar enforcement action:
- Conduct regular patch-management reviews and document them.
- Enforce multi-factor authentication onevery administrative and remote-access account.
- Validate that third-party systems use secure configuration baselines.
- Request evidence: recent pen-test summaries, MFA logs, and architecture diagrams showing data segregation.
ICO Enforcement Trend 3: Supply-Chain & Vendor Risk Is Now the Biggest Exposure
BDO notes that third-party suppliers are involved in a significant proportion of enforcement cases. This is evident across recent ICO actions.
A major example is the £14 million fine issued to Capita following a cyber incident that exposed the data of over 6 million people.
The ICO criticised:
- slow isolation of the breach,
- insufficient monitoring,
- weak patching practices, and
- inadequate oversight of third-party systems.
Similarly, the Upper Tribunal’s Clearview ruling confirmed that even overseas vendors fall under UK GDPR if they monitor UK residents.
Why SMEs must pay attention
SMEs are more dependent than ever on external providers – IT contractors, payroll services, marketing platforms, CRMs, SaaS tools, cloud storage, etc. Consequently, the regulator expects SMEs to:
- verify supplier security
- assess processors before onboarding
- maintain a vendor register
- require evidence of compliance
- include audit rights and termination clauses
In other words, your compliance is only as strong as your weakest vendor.
What SMEs should do
- Inventory all suppliers with data access
- Request evidence: certifications, test summaries, logs
- Ensure processor contracts meet Article 28 requirements
- Assess vendors annually (high-risk: quarterly)
The Athlex Data Protection free audit highlights exactly where your vendor chain poses compliance risk.
ICO Enforcement Trend 4: Governance, Documentation & Accountability Are Under the Microscope
BDO’s report highlights that the ICO is increasingly examining how decisions are made, not just whether breaches occur. Good governance – leadership awareness, documented decisions, risk logs, and internal reporting structures — is now a major enforcement factor.
This aligns with the ICO’s call for views on new enforcement-procedural guidance, signalling more transparent and structured regulatory processes.
This means SMEs are expected to show:
- clear data-protection ownership
- leadership engagement
- meaningful internal reporting
- documented risk assessments and decisions
- evidence of proactive compliance
How SMEs Can Stay Ahead – Starting Today
To prepare for these enforcement trends, SMEs should immediately focus on:
✔ DSAR workflows
✔ Data-accuracy controls
✔ Vendor oversight
✔ Incident readiness
✔ Governance documentation
And the simplest way to begin?
Use Athlex Data Protection’s Free UK GDPR Compliance Audit tool.
To read more about the biggest UK GDPR risks for SMEs, see our blog: Inside Out: Why Insider Risk Is the Biggest UK GDPR Blind Spot for SMEs.
It covers DSARs, access controls, vendor risk, system accuracy, governance, and incident readiness – all mapped into a clear action plan.

