Under Armour’s MyFitnessPal Breach: A Critical Look at GDPR’s 72-Hour Notification Rule
- Admin
- Dec 18, 2025
- 3 min read

When Under Armour announced the MyFitnessPal data breach, it quickly became one of the largest consumer data incidents in history. With over 150 million users affected, the breach ranked among the top 10 biggest globally. But beyond its massive scale, one key detail stood out: Under Armour waited four days after discovering the breach before notifying the public.
Under today’s GDPR 72-hour notification rule, such a delay would be considered a major compliance failure, potentially resulting in significant penalties. Although GDPR came into effect shortly after the breach, this incident remains a powerful reminder of how critical timely reporting is and how modern organizations must strengthen their cybersecurity posture.
This is where SentryBay Armoured Client plays a crucial role. Its advanced endpoint protection and credential-shielding capabilities help organizations detect threats earlier, reduce exposure windows, and streamline incident response. Combined with the strategic oversight of our Global E-Director serving the MENA region, businesses gain the expertise and tools needed to stay aligned with evolving regulatory expectations.
What Happened?
Here’s a breakdown of the breach timeline:
Hackers accessed the MyFitnessPal database, exposing usernames, email addresses and hashed passwords (SHA-1, considered weak by current standards).
The breach was discovered several days later.
Public disclosure occurred 96 hours after discovery.
Why This Was Concerning
If GDPR had already been active at the time:
Under Armour would have been expected to notify authorities within 72 hours, not after 96.
Delays beyond 72 hours require “adequate justification,” which regulators rarely accept.
This case highlights the gap between real-world incident handling and ideal cyber incident response plan execution.
Would Under Armour Be in Violation of GDPR’s 72 Hour Notification Rule?
Most likely, yes.
Under the GDPR 72-hour notification rule:
Organizations must notify a supervisory authority within 72 hours after discovering a breach.
Penalties can go up to €10 million or 2% of a company’s global revenue, whichever is greater.
Regulators in the EU have repeatedly penalized companies for even small delays.
Why Notification Delays Happen and Why They’re Dangerous
According to IBM’s Cost of a Data Breach Report 2023:
Most organizations take approximately 204 days to identify a breach.
Most breaches take roughly 73 days to fully contain.
Organizations that respond quickly save an average of $1 million.
This reinforces the importance of having an efficient cyber incident response plan that includes:
Rapid detection
Fast internal reporting
Immediate authority notification
Clear communication workflows
Without this structure, organizations risk missing the 72-hour window.
Lessons from Under Armour’s Breach
This breach shows that speed + structure = compliance.
A well-developed cyber incident response plan helps organizations:
React within hours, not days
Comply with GDPR timelines
Protect their reputation
Reduce legal and financial exposure
Essential Components of an Effective Cyber Incident Response Plan
1. Intelligent Threat Detection & Early Warning Systems
Breaches that go unnoticed cost more and create longer delays.
Companies using AI-assisted monitoring reduce breach detection time by up to 40%.
Organizations with mature detection save an average of $1.49 million per incident.
Early detection is the foundation for meeting GDPR 72-hour notification requirements.
2. Defined Roles, Responsibilities & Escalation Paths
During a breach, minutes matter. Organizations must pre-assign:
Breach response leads
Legal and compliance officers
Communication teams
Technical responders
Executive approvers
Companies that test their incident response strategy regularly experience 30% lower breach costs (IBM).
3. GDPR-Compliant Notification Framework
A proper notification playbook includes:
A prioritization matrix to determine GDPR-reportable breaches
Pre-written templates for supervisory authority reporting
Communication scripts for customers
A 72-hour countdown workflow
A list of authorities for each region
This prevents panic-driven delays, ensuring GDPR compliance requirements are consistently met.
4. Rapid Containment & Recovery Protocols
Technical procedures should cover:
Isolating compromised systems
Disabling affected accounts
Cutting off attacker access
Conducting forensic data capture
Applying immediate patches
Resetting passwords
Speed here directly affects both customer safety and regulatory outcomes.
5. Post-Incident Review, Reporting & Learning
Every breach should generate:
Lessons learned
System improvements
Updated procedures
Team retraining
Documentation for regulators
Organizations that perform detailed reviews improve their security posture by up to 25% year over year.
Final Thoughts
The Under Armour breach remains a clear reminder that modern organizations must be ready for strict regulatory expectations. A 96-hour delay even just 24 hours past GDPR’s 72-hour limit would now qualify as non-compliance.
To avoid similar risks, companies must strengthen incident response plans, stay aligned with GDPR requirements, and act quickly when a breach occurs. SentryBay Armoured Client supports this by providing proactive endpoint protection and reducing exposure windows.
With guidance from our Global E-Director serving the MENA region, organizations gain the strategic oversight needed to meet regulatory demands and respond faster. In cybersecurity, timing isn’t just crucial, it's the deciding factor.





Comments