
Capita
FTSE 250 UK outsourcer; fined £14m by ICO in 2026 for GDPR failures exposed by the Black Basta ransomware breach.
Last refreshed: 30 April 2026
Does the Capita ICO fine make NCSC guidance the de facto enforceable standard for UK government suppliers?
Timeline for Capita
Mentioned in: ENISA scores NIS2 maturity with NCAF 2.0
Cybersecurity: Threats and DefencesMentioned in: Beijing's Liu ruling laid the doctrine
AI: Jobs, Power & Money- Why was Capita fined £14m by the ICO?
- The ICO fined Capita £14m following the March 2023 Black Basta ransomware breach, citing failures to implement Privileged Access Management (PAM), adequate Active Directory tiering, and controls aligned with NCSC baseline guidance — all of which the ICO treated as required under Article 32 UK GDPR.Source: ICO
- Who attacked Capita in 2023?
- The March 2023 Capita cyber incident was attributed to Black Basta, a financially motivated ransomware group. Attackers maintained access for approximately nine days, exfiltrating data belonging to Capita clients including USS, NHS trusts, and local councils.Source: ICO / Capita
- Does the Capita ICO fine mean NCSC guidance is legally required?
- The ICO's enforcement notice treated NCSC guidance as the applicable security baseline when assessing technical and organisational measures under UK GDPR Article 32. While NCSC guidance is not statute, the Capita precedent means regulators can use it as evidence of what 'appropriate measures' looks like for UK organisations.Source: ICO
- What data was stolen in the Capita breach?
- The March 2023 Capita breach exposed personal data held on behalf of multiple clients including the Universities Superannuation Scheme (USS), NHS trusts, and local councils. Capita's initial disclosure understated scope; regulators later identified a wider data footprint.Source: ICO / Capita
Background
Capita plc is a UK outsourcing and IT services company founded in 1984, listed on the London Stock Exchange (FTSE 250, ticker: CPI). At its peak it was one of the UK Government's largest private contractors, running services including BBC television licensing administration, NHS data processing, and Royal Navy training. Revenue reached approximately £3.7bn in 2022 before a prolonged restructuring programme began under the private-equity-backed leadership brought in following a series of profit warnings. By 2023, Capita employed approximately 50,000 people globally across more than 30 countries.
In March 2023, Capita suffered a major cyber incident subsequently attributed to the Black Basta ransomware group — then one of the most prolific financially motivated threat actors operating against UK targets. The attackers accessed Capita's internal systems for approximately nine days before the intrusion was contained. Personal data belonging to clients including the Universities Superannuation Scheme (USS), local councils, and NHS trusts was exfiltrated. Capita's initial public disclosure understated the scope of the breach; regulators and clients subsequently identified a wider data footprint than first acknowledged, contributing to reputational and contractual damage.
Capita's ongoing restructuring — centred on shedding non-core contracts, reducing headcount, and renegotiating debt — has left it a significantly smaller business. Private-equity interest and potential further disposals have been reported periodically since 2023, though no transaction had completed as of April 2026.
The Information Commissioner's Office (ICO) issued Capita a £14m fine following its investigation into the 2023 Black Basta breach, citing failures to implement Privileged Access Management (PAM), adequate Active Directory (AD) tiering, and the controls recommended in NCSC baseline guidance — establishing that NCSC standards constitute an enforceable reference point under UK GDPR . The fine is the largest the ICO has levied against a UK outsourcer for a cyber incident and creates a precedent that procurement-chain organisations handling public-sector data face the same GDPR exposure as data controllers. For CISOs at UK Government suppliers, the Capita enforcement notice is the clearest regulatory signal yet that absence of PAM and AD tiering is not merely a hygiene risk — it is a fine-carrying GDPR failure. The decision also signals that regulators will treat NCSC guidance as the applicable security baseline when assessing adequacy of technical and organisational measures under Article 32.