L5 Data Breaches and the National Consent POlicy Flashcards
when is a data protection officer necessary for an organisation
- the processing is carried out by a public authority or body
- the core activities of the controller or the processor consist of processing operations, which require regular and systematic monitoring of data subjects on a large scale; or
- the core activities of the controller or the processor consist of processing on a large scale of special categories of data or personal data relating to criminal convictions and offences
special data cetagories
- Personal data revealing racial or ethnic origin.
- Political opinions.
- Religious or philosophical beliefs.
- Trade union membership.
- Genetic data and biometric data processed for the purpose of uniquely identifying a natural person.
- Data concerning health.
- Data concerning a natural person’s sex life or sexual orientation.
data protection impact assessments
- Mandatory for any new high risk processing projects
- To identify and mitigate against any data protection related risks arising from a new project
- Plan for the implementation of any solutions to those risks, and assess the viability of a project at an early stage.
data breach
a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data transmitted, stored or otherwise processed.” (HSE Data Breach Process Guidance, 2019)
guidelines/laws which relate to management of breaches
- HSE Data Protection Policy
- HSE Data Protection Breach Process Guidance
- Article 33 of the GDPR introduces mandatory data
breach notification obligations on organisations
HSE Breach Process Guidance
- Identify
- Notify
- Classify
- Report
- Contain and Recover
- Risk assessment
- Notification of breach
- Evaluation and response
step 2: notify
- Staff member notifies line manager within 72 hours, although really it should be immediately
- Manager is notified and will sign the Data Breach Incident Report form
step 3: classify
Manager will identify if it is a data protection breach or data protection incident
step 4: report
- The staff member and manager complete data breach incident form
- Which is sent to Deputy Data Protection Officer who confirms breach / incident
- Also sent to Office of Chief Information Officer (OoCIO) if information systems breach
Step 4: report (if it’s an incident)
- DDPO advises of any corrective action to make
- Manager logs incident and implements corrective actions
Step 4: report (if it’s a breach)
DDPO logs breach with Data Protection Commission and advises of corrective actions that have been taken
Step 5: contain and recover
- The manager will limit the scope and impact of the breach of data (eg. changing access)
- DDPO establish who in the organisation needs to be made aware of the breach and inform them of what they are expected to do to assist in the containment exercise (eg Garda, communications dept)
- OoCIO has a role in containment if it was an IT breach (eg wiping a mobile device)
Step 6: risk assessment
- Consider what would be the potential adverse consequences for individuals:
a) What type of information/data is involved?
b) How sensitive is the information/data?
c) Are there any security mechanisms in place (e.g. password, protected, encryption)?
d) What could the information/data tell a third party about the individual?
e) How many individuals’ are affected by the breach?
- If large scale/highly sensitive → DDPO informs DPO who will advise of necessary corrective actions
Step 7: notification of breach
- Outline what occurred
- Apologise for the incident
- Provide name and contact for further info
- Describe the likely consequences of the breach
- Describe the measures taken to address the breach
- Confirm the DPC has been notified
- Record notification to data subject
Step 8: Evaluation and response
- A thorough review of the incident should occur.
- Ensure that the steps taken during the incident were appropriate and to identify areas that may need to be improved.
- Any recommended change to policies and/or procedures should be documented and implemented as soon as possible thereafter