Data Breach Recommendation For A Practical Methodology and Implementation
Data Breach Recommendation For A Practical Methodology and Implementation
Introduction
Challenges
Notify, Respond & Remediate
Definition
Art 3 (16) GDPR - a ‘personal data breach’ means a breach of security leading to the accidental or
unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data
transmitted, stored or otherwise processed under the responsibility of the EUI as a controller.
a) Vulnerability – weakness of an asset or control that can be exploited by one of more threats (e.g.
SQL injection vulnerability web applications, outdated anti-malware software)
“data breaches are problems in and of themselves, but they are also symptoms of a
vulnerable, possibly outdated security regime” (EDPB Guidelines on Data Breach
Examples)
EIPA, 10/26/2021 - WWW.EIPA.EU ©
Root Cause of Data Breaches
Source: EDPS
EIPA, 10/26/2021 - WWW.EIPA.EU ©
Awareness – A Strategic Imperative
▪ Awareness/trainings
➢ Deliver trainings in the orientation phase for each new employee before processing personal data
➢ Trainings tailored-made to your organisation so that the employees can apply in their day-to-day activity
➢ Choose for creative trainings in small, frequent chunks & video content
➢ Ensure senior leadership are involved in the awareness campaign (leading by example)
➢ Assessment at the end of the training to test staff understanding and make sure that it is effective, which could
include a minimum pass mark
➢ Make sure the material is updated so that these address latest trends and alerts coming from cyberattacks or other
security incidents” (EDPB, Guidelines 1/2021 on Examples regarding Data Breach Notification)
➢ Phishing - phishing tactics may rely on shotgun methods that deliver mass emails to
random individuals,
➢ Spear phishing – unlike phishing, this is a targeted attempt to steal sensitive information
such as account credentials or financial information from a specific victim
➢ Baiting – online and physical social engineering that promises the victim a reward
➢ Malware – victims are tricked into believing their computer has a malware installed
➢ Quid pro quo – relies on an exchange of information or services to convince you to act
➢ Tailgating – relies on human trust to get physical access to a secure building or area
IT Operations
➢ Vishing – urgent voice mails to convince the victim to act quickly
IT Operations
Source: Europol
IT Operations
Source: Europol
Review if it
is likely to Record and
occur again close the
and take case
prevention
action (aud
EIPA, 10/26/2021 - WWW.EIPA.EU ©
Asses & Notify a Data Breach
▪ Severity Assessment
Definition
The main criteria taken into account while assessing the severity of a data breach are:
• Simple (e.g. full name, contact details, family life, professional experience, etc.) - score 1
• Behavioural (e.g. location, traffic data, data on personal preferences or habits, etc.) – score 2
• Financial (income, financial transactions, bank statements, investments, credit cards, invoices, etc.) – score 3
• Sensitive data (health data, political affiliation, sexual life, etc.) – score 4
B. Assess the occurrence of certain aggravating factors (data volume, special characteristics of the controller or the
individuals, invalidity/inaccuracy of data, publicly available (before the breach, nature of the data)) and if they exist
increase the score
DPO HR
Legal
PR IT / Cybersecurity Operations
Operations
▪ Unexpected Challenges
▪ Art. 82 “Any person who has suffered material or non-material damage as a result of an
infringement of this Regulation shall have the right to receive compensation from the
controller or processor for the damage suffered”
EIPA, 10/26/2021 - WWW.EIPA.EU ©
Audit and Improve