How can we help you?

Last week half a million UK Biobank participants woke up to the reality that their health data had been offered for sale online.

UK Biobank is one of the world’s most significant health research resources, built on voluntary public participation and long term trust. When that trust is shaken, the consequences extend far beyond a single incident or dataset. The timing is also significant. It comes as the government moves forward with proposals under the Cyber Security and Resilience (Network and Information) Bill, signalling a shift towards stronger expectations of organisational responsibility, resilience and accountability in the handling of critical and sensitive data.

Although ministers have stressed that the data was “de identified” and that there is no evidence any sale was completed, the episode highlights how fragile confidence in large scale data initiatives can be; particularly when sensitive health and genetic information is involved.

The facts

UK Biobank confirmed that three datasets containing participant information were identified as having been advertised for sale on an online marketplace, with at least one dataset apparently covering the entire cohort of volunteers.
The incident was not the result of an external cyber attack. Instead, the information appears to have been accessed by researchers or institutions with legitimate credentials and then misused in breach of applicable access restrictions. UK Biobank responded by suspending access to its research platform, revoking permissions from the institutions involved and referring the matter to the Information Commissioner’s Office.

While the absence of direct identifiers such as names or NHS numbers has been emphasised, the sensitivity of the data remains clear. Genomic, health and demographic information is widely recognised as capable of re identification when combined with other sources, which will be a cause for concern for many participants.

Why reassurance alone is not enough

From a regulatory perspective, much attention focuses on whether data meets the threshold for anonymisation. From a public perspective, however, expectation and perception matter just as much as technical classification.

Many participants shared their data years ago, motivated by altruism and confidence that robust controls would remain in place throughout the lifecycle of the project. The idea that the data could be listed for sale, even briefly, risks cutting across those expectations and reinforcing a broader public narrative of repeated failures in safeguarding sensitive information.

In projects that depend on voluntary participation, trust is not incidental. It is an operating requirement.

When governance gaps turn into disputes

Incidents of this nature rarely remain confined to regulatory scrutiny or internal reviews. Where complex data sharing arrangements are involved, questions inevitably arise about how responsibility is allocated when safeguards fail in practice, and whether existing frameworks were adequate for the risks involved.

Access to large research datasets typically rests on layered governance structures: contractual access agreements, acceptable use restrictions, audit rights and controls on onward disclosure. When those arrangements come under strain, tensions can emerge between data custodians, research institutions, collaborators and, in some cases, insurers.

Even where no individual harm can be readily demonstrated, pressure points tend to form around:

  • interpretation and enforcement of access conditions;
  • responsibility for investigation, remediation and redesign costs;
  • allocation of regulatory and reputational risk; and
  • whether governance models kept pace with the scale and sensitivity of the data being shared.

These issues are familiar territory for our commercial disputes teams. We regularly advise clients on the fallout from data related governance failures including disputes arising from data sharing arrangements, allegations of misuse by trusted counterparties, and disagreements over how regulatory, remediation and reputational risk should be allocated. Early involvement can often prevent matters escalating into formal proceedings, while preserving key commercial and institutional relationships.

Safeguarding contingencies and undertaking thorough internal reviews at an early stage can materially reduce the risk of disputes crystallising.

What this means for data holders and processors

For organisations entrusted with sensitive datasets, the UK Biobank incident reinforces several key lessons.

First, contractual controls, whilst essential, are not sufficient on their own. Regulators and stakeholders increasingly expect technical and operational safeguards that prevent misuse, rather than reliance on downstream compliance alone.

Secondly, assumptions about de identification require careful reassessment. Under UK data protection law, information may still be personal data if individuals are reasonably identifiable, taking account of available technology, auxiliary datasets and future capabilities.

Thirdly, governance matters as much as security. Under the Cyber Security and Resilience Bill’s proposed approach, governance failures are no longer treated as secondary compliance issues but as core cyber resilience risks in their own right, capable of triggering regulatory intervention where accountability mechanisms are ineffective in practice. 

The UK GDPR accountability principle requires organisations to demonstrate not just that policies exist, but that they operate effectively in practice. Monitoring, auditability and escalation mechanisms are critical.

Finally, organisations should expect greater scrutiny of international data access arrangements, including whether safeguards remain effective once data crosses borders or enters complex research ecosystems.

Whilst compliance is a driving factor to adopt the above lessons, clear governance frameworks, technically enforceable controls and carefully drafted access arrangements can significantly strengthen an organisation’s position if incidents later trigger regulatory scrutiny or commercial disagreement.  

A measured note of optimism

Despite the seriousness of the incident, there is reason for cautious optimism. UK Biobank’s swift response, transparency and willingness to pause access while safeguards are strengthened reflect a growing maturity in how organisations respond to data incidents.

More broadly, events like this are driving meaningful investment in stronger infrastructure, clearer accountability and governance models that better reflect the realities of modern data use. If the lesson taken is that trust must be actively engineered, maintained and tested, rather than assumed, incidents of this kind can ultimately strengthen, rather than undermine, confidence in large scale data initiatives.

At Trowers, we increasingly see incidents like this sit at the intersection of data governance and commercial disputes; where early, strategic advice can help organisations protect trust, contain risk and avoid prolonged conflict.