This is how you inform victims about a data breach

Does a data breach result in high risks? Then you have to inform the victims as quickly as possible. This way, you ensure that people understand what has happened with their personal data and that they know what they can do to protect themselves. You inform the victims with a warning message. An email, for example. 

Every data breach is different and requires a different approach. On this page you will find 8 recommendations with example texts. They will help you get started.

Note: It is your responsibility to draw up a clear warning message and to tailor your message to your specific situation. You are also obliged by law to do this.

On this page

Why is a clear warning message important?

A data breach may have very harmful consequences for the people whose data have been leaked.

  • Have contact details been leaked? Then the victims are vulnerable to phishing. A phishing message looks like a message from your organisation, but is an attempt by criminals to scam your customers or contacts.
  • Have passwords been leaked? Criminals can then log in to the accounts of victims, but also to other websites if victims use the same password.
  • Have copies of identity documents been leaked? In that case, someone’s identity can be stolen. Every year, the Central Reporting Centre for Identity Fraud (CMI) receives around 7,000 reports of identity fraud.

Supervision by the Dutch DPA on warning messages

To prevent this kind of harmful consequences, it is very important that you inform the victims of a data breach in a proper manner. If you fail to do so, this may result in considerable (reputational) damage for your organisation as well. Besides, the Dutch Data Protection Authority (Dutch DPA) checks on a regular basis if organisations inform victims and how they do this.

8 recommendations for good warning messages

If you want to send a good warning message, pay attention to these 8 recommendations:

  1. Communicate with the victims as soon as possible
  2. Write a simple and clear text
  3. Give a clear and complete description of what has happened
  4. Indicate clearly which data have been leaked
  5. Mention the probable consequences for victims
  6. Where possible, give a specific advice to victims
  7. Give a description of the measures that are taken by your organisation
  8. Mention a point of contact that victims can turn to if they have questions

Below you will find explanations and examples.

1. Communicate with the victims as soon as possible

Let victims know without undue delay what has happened. If someone's data have been leaked, those may easily fall into the wrong hands. Avoid unpleasant consequences such as fraud and inform victims as soon as possible. Only then will they be able to take action as well.

Are you still investigating the data breach? And do you consequently not have all information yet? In that case, send a preliminary warning message first. Victims will then know that something has happened and can be alert to the abuse of their data. As soon as you know more about the data breach, you provide them with further information.

2. Write a simple and clear text

Make sure that the warning message can be understood by everyone. Use, for example:

  • sentences of 10 words on average and no more than 15 words;
  • few difficult words, and explain difficult words that you cannot avoid;
  • clear subheadings;
  • sufficient white space;
  • enumerations instead of long sentences;
  • the language of the country where the victims live.

Avoid jargon and provide the most important information immediately in a clear intro. Start by saying that a data breach has occurred. And that it has affected the personal data of the reader.

Split up a long sentence in several sentences, for example.

Many victims are not familiar with terms such as ‘(spear) phishing’. Use as few of these kinds of terms as possible. Do you really not have an alternative for such a term? Then explain the term clearly.

It is very important that victims open your warning message quickly and read it carefully. For this reason, put an alarming title in the subject line.

3. Give a clear and complete description of what has happened

Say in the warning message what kind of data breach it concerns. For example: a ransomware attack, phishing, or a letter that was sent to the wrong address. 

Is it still unclear what has happened? Say this too. And indicate when you will give the victims more information. Aa soon as the investigation into the data breach has been completed, for example. Also indicate if the data have fallen into the hands of unauthorised persons, have been lost, or that you can no longer access the data.

This text does not say clearly what type of data breach it concerns and what exactly has happened.

4. Indicate clearly which data have been leaked

Be as specific as possible about which data have been leaked (for example: name and address). Do not only mention the categories (for example: name and address details). Words like ‘for example’ or ‘such as’ may cause confusion for the victims.

Are there differences in which data of people have been leaked? Then identify as quickly as possible which situation applies for which victims. And draw up different warning messages for them.

Are you not (yet) certain which data have been leaked? Then indicate why this is unclear. And when you will be able to give the victims more information about this.

5. Mention the probable consequences for victims

Data breaches may result in the abuse of data. Through phishing, for example. Are there likely to be consequences for victims? Then you have to tell them which. And how they can protect themselves.

Answer these questions:

  • Is there a risk of immaterial damage? Such as reputational damage, or exclusion? Or is there a risk of physical or material (financial) damage?
  • Are personal data in the hands of a malicious person? A hacker, for example? If so, is there a risk of phishing or identity fraud?
  • Have the personal data been returned to you in the meantime, or have they been destroyed by the party that wrongly received the data?
  • Have contact details been leaked? And if so, how exactly can criminals use those data?

If passwords have been leaked, criminals can log in to other sites where victims use the same password. Explain that it is safer to use different passwords. And have people change their password for your website of customer environment.

If copies of identity documents have been leaked, there is a risk of identity fraud. Clearly explain what identity fraud is and what someone can do.

6. Where possible, give a specific advice to victims

Does a data breach result in an immediate risk? If yes, provide victims with a clear and appropriate advice about how they can protect themselves. This advice depends on the situation. Victims can also look at: Victim of a data breach? This is what you can do.

Have passwords been leaked in the data breach? Then people have to adjust their password on every website on which they use this password.

Have full copies of identity documents been leaked in the data breach? That means: documents on which all data were visible, such as the BSN and the passport photo? And was there a cyber incident? In that case, victims have to report this to their municipality to prevent identity fraud.

The Dutch DPA advises to refer victims to:

7. Give a description of the measures that are taken by your organisation

You have to let victims know which measures you take to close the data breach and to prevent future data breaches.

Do not only mention that measures have been taken, but also which measures. Does it concern technical measures? Explain them in simple and clear language. Did you ask external parties for advice? Then also say what that advice entails.

8. Mention a point of contact that victims can turn to if they have questions

A warning message can raise a lot of questions. That is why you should already answer as many questions as possible in your warning message. And indicate how victims can contact your organisation. Through your Data Protection Officer (DPO), for example.