EU Regulation 2016/679 - Decision Register

MONETARY PENALTY NOTICE OF THE ICO / 16 OCTOBER 2020

British Airways £20 Million ICO Fine, 2020 Decision Explained (Reduced from £183M)

The ICO's largest GDPR fine to date. British Airways was fined for the 2018 customer-data breach that exposed payment cards and personal data of 429,000 customers. The notice-of-intent figure of £183M was reduced by 89% after representations.

Fine amount

£20,000,000

Original notice

£183,390,000

Issuing DPA

UK ICO

Decision date

16 October 2020

Articles cited

Article 32

EDUCATIONAL ONLY

This page is a reference summary of a published regulator decision. It is not legal advice. Consult a qualified data protection lawyer for advice on your specific situation. The UK GDPR is a separate regime from the EU GDPR following Brexit. Always read the source decision in full before relying on any figure or quote.

DECISION SUMMARY

What happened

Between 21 June 2018 and 5 September 2018, an attacker compromised the British Airways website and mobile-app infrastructure and exfiltrated personal and payment-card data of approximately 429,000 customers and staff. The data exfiltrated included names, billing addresses, email addresses, payment-card numbers, card-expiry dates and card-verification values. The attack used a technique commonly referred to as "Magecart", in which malicious JavaScript is injected into a website's payment-page asset chain to intercept payment-card details as users enter them.

British Airways became aware of the breach on 5 September 2018 after being notified by a third party. The airline notified the ICO on 6 September 2018 and publicly disclosed the breach the same day. The ICO opened a formal investigation under Articles 32 (security of processing) and 33 (breach notification) GDPR. On 4 July 2019, the ICO issued a Notice of Intent to fine British Airways £183.39 million, approximately 1.5% of British Airways' 2017 worldwide turnover.

British Airways made extensive representations to the ICO between July 2019 and October 2020. The representations addressed the proportionality of the proposed fine relative to the gravity and duration of the infringement, mitigating factors including British Airways' remediation work, the impact of the COVID-19 pandemic on its financial position, and analogous fine levels in comparable breach cases. The ICO accepted these representations in part. On 16 October 2020 the ICO issued the final Monetary Penalty Notice in the amount of £20 million.

What the ICO found on security

The ICO's Article 32 analysis identified multiple security weaknesses that, in combination, fell below the appropriate technical and organisational measures standard required of a controller processing payment-card data at scale. The decision references specific shortcomings. First, there was no multi-factor authentication required for application-level access by privileged users, including for the Citrix remote-access environment through which the initial compromise was achieved. Second, network segmentation between systems holding different categories of personal data was inadequate, so a compromise in one environment provided lateral-movement access to others. Third, file-integrity monitoring on customer-facing infrastructure did not detect or alert on the injection of the malicious JavaScript despite the file modifications being significant and long-lived. Fourth, payment-card data was accessible to components of the infrastructure that did not require it for any business purpose.

The decision is careful to note that British Airways was not held to a standard of perfect security. Article 32 GDPR requires "appropriate" measures, taking into account the state of the art, the cost of implementation, the nature, scope, context and purposes of processing, and the risk to the rights and freedoms of natural persons. The ICO's analysis was that the measures BA had in place did not meet the appropriate standard for a payment-card processing environment serving millions of customers. The specific weaknesses identified were each addressable through controls that were industry-standard practice at the time (MFA for privileged access, network segmentation, file-integrity monitoring), at a cost proportionate to BA's scale.

The 89% reduction

The 89% reduction from Notice of Intent (£183M) to final decision (£20M) is the most-discussed feature of the case. The publicly available Penalty Notice does not provide a line-by-line breakdown of how the reduction was calculated, but it identifies several factors that contributed.

First, the ICO accepted that the original Notice of Intent had not appropriately weighted certain mitigating factors, including BA's prompt cooperation with the investigation, the immediate steps BA took to contain and remediate the breach, and the steps taken to assist affected customers. Second, the ICO accepted that the COVID-19 pandemic had materially affected BA's financial position and that a fine of the originally proposed scale would be disproportionate to BA's ability to pay without affecting its operational viability. The decision references the "effective, proportionate and dissuasive" principle in Article 83(1), noting that disproportionate fines can undermine the regulator's broader objectives. Third, the ICO recalibrated the gravity assessment given the absence of evidence of large-scale downstream fraud against affected customers.

The case has become a recurring reference point for controllers and counsel considering representations against ICO notices of intent. The 89% delta is at the high end of what has been achieved in published UK GDPR decisions, but subsequent decisions (Marriott, reduced from £99M to £18.4M, an 81% reduction) have shown that significant reductions are achievable where representations are substantive and address Article 83(1) proportionality directly.

What this means for security teams

For CISOs in regulated payment environments, the BA decision provides four concrete reference points. First, multi-factor authentication for privileged access is treated as an appropriate measure baseline; its absence is an aggravating factor in security-failure cases. Second, network segmentation between PCI and non-PCI environments (and between customer-facing and back-office systems) is similarly baseline. Third, file-integrity monitoring on payment-page asset chains should detect unauthorised JavaScript injection. Fourth, the principle of data minimisation (Article 5(1)(c)) requires that payment data should not be accessible to components that do not need it for a defined business purpose; the architectural breadth of access is itself an Article 32 risk.

For boards, the decision is a reminder that Article 32 fines for inadequate security are not contingent on intent or recklessness. Article 32 imposes an objective standard, and a controller can be fined for failing to meet that standard even where there is no evidence of bad faith. The defence against an Article 32 fine is documented, risk-proportionate, and regularly-tested security architecture, not after-the-fact remediation.

FREQUENTLY ASKED

About the British Airways £20 million fine

Why was British Airways fined?
In June-September 2018, an attacker compromised the British Airways website and mobile app and exfiltrated payment-card data and personal data of approximately 429,000 customers. The ICO found that British Airways did not have appropriate technical and organisational security measures in place, in breach of Article 32 GDPR. The breach was achieved by exploiting weaknesses in the BA web infrastructure that, the ICO concluded, were not in line with industry standard practice.
Why was the fine reduced from £183 million to £20 million?
The ICO issued a Notice of Intent in July 2019 proposing a fine of £183.39 million. British Airways made detailed representations on the proportionality of the proposed fine, the impact of the COVID-19 pandemic on its business, and mitigating factors. The ICO accepted these representations in part. The final fine of £20 million was issued in October 2020, an 89% reduction from the Notice of Intent figure.
Did British Airways appeal?
British Airways did not appeal the final £20 million fine and paid it in full. A separate civil group litigation by affected customers was settled in 2021 for an undisclosed sum.
Was this the largest UK GDPR fine?
Yes, at the time. It held the top spot until the ICO fine of TikTok UK (£12.7 million, 2023) and subsequent decisions in the 2024-2025 period. The £20 million figure remains the second-largest single ICO GDPR fine through 2026.
What technical failures did the ICO identify?
The decision identifies multiple weaknesses including: lack of multi-factor authentication for application access; lack of network segmentation between systems holding different categories of data; insufficient monitoring of file integrity on customer-facing infrastructure; payment-card data being accessible to systems that did not need it. The ICO did not require BA to have had perfect security but found that the combination of weaknesses fell below the appropriate-measures standard of Article 32.
What does this case tell other companies?
For boards and CISOs, the BA decision is the leading UK authority on Article 32 inadequate-security infringement and the most-cited case on fine-amount mitigation through representations. The reduction from £183M to £20M (a Notice of Intent to final-decision delta of 89%) shows the value of substantive, well-documented representations on proportionality and on financial-impact mitigating factors.

CROSS-REFERENCES

Related entries on this register

RELATED CASE

Marriott £18.4M ICO Fine (2020)

The other 2020 ICO Article 32 case. Reduced from £99M, similar pattern.

Open reference →

ARTICLE 32

Article 32 GDPR Fines

Inadequate-security enforcement framework, with BA and Marriott as the leading UK authorities.

Open reference →

SUPERVISORY AUTHORITY

UK ICO Profile

The post-Brexit UK GDPR enforcement record. BA still the largest UK fine.

Open reference →

METHODOLOGY

How GDPR Fines Are Calculated

The Article 83(2) factor analysis used in this decision.

Open reference →

ECONOMICS

Compliance Cost vs Fine Cost

How an Article 32 security programme compares to a £20M fine.

Open reference →

REGISTER

Full Decision Register

Every major indexed GDPR fine.

Open reference →

SOURCES & CITATIONS

Primary sources

Figures as of May 2026. Verified against published DPA decisions.

REGISTER UPDATED 2026-04-28