A computer-implemented method for detecting data leaks may include (1) monitoring at least one data-distribution channel utilized by an entity, (2) detecting a plurality of full DLP policy violations and/or partial DLP policy violations committed by the entity by analyzing data distributed by the entity via the data-distribution channel, (3) determining that the entity's DLP policy violations cumulatively exceed a predetermined threshold, and (4) performing a security action in response to determining that the entity's DLP policy violations cumulatively exceed the predetermined threshold. Various other methods, systems, and computer-readable media are also disclosed.