Data-Breach-Incident-Report
Data-Breach-Incident-Report
CONFIDENTIAL
The GDPR defines a “personal data breach” in Article 4(12) as: “a breach of security leading to the
accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal
data transmitted, stored or otherwise processed”.
Breach ID:
When was the breach discovered? e.g. Specific time & date
Yes No
If YES, state by what means (e.g. phone, email etc.) and the time and date of the contact
made?
If NO, was any other senior official e.g. CE, Director etc. contacted and if so, by what means
(e.g. phone, email etc.) and the time and date of the contact made?
1
Were there any witnesses? If Yes, state Names & phone contact details
What categories of data subjects (e.g. students, adult learners, parents/guardians; other
vulnerable groups, employees, board members; contractors etc.) were affected and/or
potentially affected by the breach?
Categories of personal data/records (e.g. health data, education records, social care
information, financial details, bank account numbers, passport numbers etc):
Description of the likely consequences of the personal data breach (e.g. identity theft, fraud,
financial loss, threat to professional secrecy etc.):
Important note: where the exact details of any of the above are not yet known, this shall not
delay a timely breach notification to the DPC. Further information can follow, when
available: “the information may be provided in phases without undue further delay 1”.
2
Was the breached data protected through passwords, encryption etc.? Supply details below.
In your opinion, is the breach likely to be of a temporary nature? Can the personal information
exposed be recovered?
Were any IT systems involved? (e.g. email, website, school admin system, VS Ware, Facility,
apps). If so, please list them.
Is any additional material available e.g. error messages, screen shots, log files, CCTV footage?
Have you taken any action/steps so far to seek to stop/mitigate the risk either to the data
subject/s who you think have been affected OR any other additional data subjects you
consider may be affected? If YES, please describe below
Have you spoken to someone in ETB management team at administrative head office level e.g.
CE, Director, Head of IT etc?
If so, please advise whom you contacted, and a brief outline of the advice given by him/her.
3
Have you made any contact with any external agencies e.g. Insurance Company, IT provider,
Gardaí etc.? If YES, please describe below specifically whom you contacted and supply the
name and contact details of same.
Signed:
Your position in the ETB:
Name of school, office, centre:
Thank you for your efforts in completing this form. The effort undertaken in its completion will
help the ETB in its further investigation/analysis of the matter.
Please ensure this is forwarded directly to the ETB Data Protection Office
4
For your reference
Breaches can be categorised according to the following three well-known information security
principles:
(a) “Confidentiality breach” - where there is an unauthorised or accidental disclosure of, or
access to, personal data.
(b) “Integrity breach” - where there is an unauthorised or accidental alteration of personal
data.
(c) “Availability breach” - where there is an accidental or unauthorised loss of access15 to, or
destruction of, personal data.
Depending on the circumstances, a breach can concern confidentiality, integrity and availability of
personal data at the same time, as well as any combination of these. Whereas determining if there
has been a breach of confidentiality or integrity is relatively clear, whether there has been an
availability breach may be less obvious. A breach will always be regarded as an availability breach
when there has been a permanent loss of, or destruction of, personal data.
DO’S
immediately isolate the affected system to prevent further intrusion, release of data, damage
etc.
use the telephone to communicate. Attacker may be capable of monitoring e-mail traffic
contact the ETB Data Protection Office without delay KCETB, Seville Lodge, Callan Road,
Kilkenny
preserve all pertinent logs, e.g. firewall, router and intrusion detection system.
make back-up copies of damaged or altered files and keep these backups in a secure
location.
identify where the affected system resides within the network topology
identify all systems and agencies that connect to the affected system
identify the programs and processes that operate on the affected system(s), the impact of the
disruption and the maximum allowable outage time.
in the event the affected system is collected as evidence, make arrangements to provide for
the continuity of services i.e. prepare redundant system and obtain data back-ups.
DON’Ts
5
For Breach Management Team Use Insert details in column below
Only
Details logged by:
Numbers of likely people affected by the Estimated number of data subjects affected?
breach Types of data affected?
6
CE and or members of the senior Yes No
management team to be notified
Contact details for Supervisory Authority If YES, list date and time of notification and any
advice/instruction given by the Supervisory
Data Protection Commission Authority:
Telephone: +353 57 8684800
+353 (0)761 104 800
Lo Call Number: 1890 252 231
Fax: +353 57 868 4757
E-mail: [email protected]
Postal:
Data Protection Commission
Canal House
Station Road
Portarlington
R32 AP23
Co. Laois
Signed by CE / nominee:
Date:
7
Appendix 2 - Guidelines on Personal data breach notification under Regulation 2016/679
Source: file:///C:/Users/d.keogh/Downloads/wp250rev01_enpdf%20(2).pdf
The following non-exhaustive examples will assist controllers in determining whether they need to
notify in different personal data breach scenarios. These examples may also help to distinguish
between risk and high risk to the rights and freedoms of individuals.
8
that the incident by other means,
ransomware’s it may consider an
only functionality investigation to assess
was to encrypt the compliance with the
data, and that broader security
there was no requirements of Article
other malware 32.
present in the
system.
v. An individual Yes. Only the individuals If, after further
phones a bank’s affected are notified if investigation, it is
call centre to there is high risk and it identified that more
report a data is clear that others individuals are affected,
breach. The were not affected. an update to the
individual has supervisory authority
received a must be made and the
monthly statement controller takes the
for someone else. additional step of notifying
other individuals if there is
The controller high risk to them.
undertakes a
short investigation
(i.e. completed
within 24 hours)
and establishes
with a reasonable
confidence that a
personal data
breach has
occurred and
whether it has a
systemic flaw that
may mean other
individuals are or
might be affected.
vi. A controller Yes, report to lead Yes, as could lead to The controller should take
operates an online supervisory authority if high risk. action, e.g. by forcing
marketplace and involves cross border password resets of the
has customers in processing. affected accounts, as well
multiple Member as other steps to mitigate
States. The the risk.
marketplace
suffers a cyber- The controller should also
attack and consider any other
usernames, notification obligations,
passwords and e.g. under the NIS
purchase history Directive as a digital
are published service provider.
online by the
attacker.
vii. A website hosting As the processor, the If there is likely no The website hosting
company acting website hosting high risk to the company (processor)
as a data company must notify individuals they do not must consider any other
processor its affected clients (the need to be notified. notification obligations
identifies an error controllers) without (e.g. under the NIS
in the code which undue delay. Directive as a digital
controls user service provider).
authorisation. The Assuming that the
effect of the flaw website hosting If there is no evidence of
means that any company has this vulnerability being
9
user can access conducted its own exploited with any of its
the account investigation the controllers a notifiable
details of any affected controllers breach may not have
other user. should be reasonably occurred but it is likely to
confident as to be recordable or be a
whether each has matter of non-compliance
suffered a breach and under Article 32.
therefore is likely to be
considered as having
“become aware” once
they have been
notified by the hosting
company (the
processor). The
controller then must
notify the supervisory
authority.
viii. Medical records in Yes, the hospital is Yes, report to the
a hospital are obliged to notify as affected individuals.
unavailable for the high-risk to patient’s
period of 30 hours well-being and privacy
due to a cyber- may occur.
attack.
ix. Personal data of a Yes, report to Yes, report to
large number of supervisory authority. individuals depending
students are on the scope and type
mistakenly sent to of personal data
the wrong mailing involved and the
list with 1000+ severity of possible
recipients. consequences.
x. A direct marketing Yes, notifying the Yes, report to Notification may not be
e-mail is sent to supervisory authority individuals depending necessary if no sensitive
recipients in the may be obligatory if a on the scope and type data is revealed and if
“to:” or “cc:” fields, large number of of personal data only a minor number of
thereby enabling individuals are involved and the email addresses are
each recipient to affected, if sensitive severity of possible revealed.
see the email data are revealed (e.g. consequences.
address of other a mailing list of a
recipients. psychotherapist) or if
other factors present
high risks (e.g. the
mail contains the initial
passwords).
10