News and developments
Cybersecurity Attacks and Data Breaches: Regulatory and Legal Framework in Cyprus
In the digital age, cybersecurity breaches—commonly referred to as “hacking incidents”—have become increasingly disruptive, posing significant legal, financial, and reputational risks to organizations. These incidents can lead to unauthorized access to sensitive information, causing harm not only to the affected companies but also to individuals whose data may be compromised. It is therefore imperative for Cypriot companies to be well-informed about their responsibilities and to take prompt action to mitigate the consequences of such breaches. This article provides a concise overview of the key guidelines that should be followed in the event of a data breach.
First and foremost, under the General Data Protection Regulation (GDPR) — Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 (hereinafter referred to as “the Regulation”) — organizations have clear legal obligations in the event of a personal data breach. Pursuant to Article 33 of the regulation, when a breach occurs, the Data Protection Officer (DPO), or another responsible person within the organization, must notify the Office of the Commissioner for Personal Data Protection without undue delay and, where feasible, no later than 72 (seventy – two) hours after becoming aware of the breach. This timely notification is critical to ensure appropriate regulatory oversight and to protect the rights of data subjects.
It has to be noted that if such notification is not made within the 72-hour timeframe, the entity must provide a justified explanation for the delay. The notification must, inter alia, include the nature of the personal data breach, the categories and approximate number of data subjects affected, the likely consequences of the breach, and the measures taken or proposed to address the breach and mitigate its potential adverse effects. In reference to the above – mentioned according to article 34 of the regulation, when the personal data breach is likely to result in a high risk to the rights and freedoms of natural persons, the data controller must also communicate the breach to the data subjects without undue delay, using clear and plain language to describe the nature of the breach.
Furthermore, the hacking incident must be reported to the relevant police authorities without undue delay. Timely notification is essential to enable law enforcement to initiate appropriate investigative and protective actions, mitigate any ongoing or future threats, facilitate potential criminal proceedings, and uphold the rights and interests of the individuals whose personal data may have been compromised.
While criminal prosecution is a vital aspect of addressing cybercrime, victims of such incidents may also seek civil remedies through the courts to obtain compensation and prevent further harm. In the aftermath of a cyber incident—such as hacking, data breaches, or unauthorized interference with servers—interim reliefs play a critical role in preserving evidence, protecting sensitive data, and preventing further harm. These remedies are granted by the court on an urgent and often ex parte (without notice) basis, particularly where the risk of irreparable damage or destruction of evidence exists. The most essential interim reliefs in such cases are inter alia the following:
It is essential to state that English case - law treats hacking incidents with increasing seriousness, recognizing them as significant violations of property rights and personal privacy under common law principles. Courts have consistently upheld that unauthorized access to computer systems constitutes a tortious wrong, often framed as trespass to chattels or misuse of private information. Additionally, English courts have demonstrated a strong willingness to grant robust interim remedies—such as injunctions and Anton Piller orders—to prevent ongoing harm and preserve crucial digital evidence. Through precedent, the judiciary emphasizes the need to protect both commercial interests and individual data privacy, balancing the rapid technological developments with established legal doctrines. This evolving body of case law reflects a proactive approach in addressing cybercrime within the civil justice system alongside parallel criminal prosecutions.
In conclusion, addressing hacking incidents requires swift action, clear legal obligations, and effective remedies to protect data and prevent further damage. Legal systems are evolving to respond firmly to cyber threats, balancing the need for security with individual rights. Coordinated regulatory, criminal, and civil measures are essential to combat and mitigate the impact of cybercrime in today’s digital world.
Author: Myria Pornari, November 2025
