Responding and Action To Data Breaches
Responding and Action To Data Breaches
Responding and Action To Data Breaches
Data breaches can be caused or exacerbated by a variety of factors, affect different types of
personal information and give rise to a range of actual or potential harms to individuals, agencies
and organisations.
As such, there is no single way of responding to a data breach. Each breach will need to be dealt
with on a case-by-case basis, undertaking an assessment of the risks involved, and using that risk
assessment as the basis for deciding what actions to take in the circumstances.
There are four key steps to consider when responding to a breach or suspected breach:
DATA BREACH OCCURS
Personal information is lost or subjected to unauthorized access, modification, use or
disclosure, or other misuse or interference.
Process of Notification
Where there is a real risk of serious harm,
When? - as soon as possible
notification may enable individuals to take steps
to avoid or mitigate harm. Consider: How? - direct contact preferred
(mail/phone)
Who? - entity with the direct
Legal/contractual obligations to notify
relationship with the affected
Risk of harm to individuals (identity
individual
crime, physical harm, humiliation,
What? - description of breach, type
damage to reputation, loss of business or
of personal information involved,
employment opportunities
steps to help mitigate, contact details
for information and assistance.
For example, stop the unauthorised practice, recover the records, or shut down the system that
was breached. If it is not practical to shut down the system, or if it would result in loss of
evidence, then revoke or change computer access privileges or address weaknesses in physical or
electronic security.
Assess whether steps can be taken to mitigate the harm an individual may suffer as a result of a
breach.
For example, if it is detected that a customer’s bank account has been compromised, can the
affected account be immediately frozen and the funds transferred to a new account?
Move quickly to appoint someone to lead the initial assessment. This person should have
sufficient authority to conduct the initial investigation, gather any necessary information and
make initial recommendations. If necessary, a more detailed evaluation may subsequently be
required.
Determine whether there is a need to assemble a team that could include representatives from
appropriate parts of the agency or organisation.
Determine who needs to be made aware of the breach (internally, and potentially externally) at
this preliminary stage.
In some cases it may be appropriate to notify the affected individuals immediately (for example,
where there is a high level of risk of serious harm to affected individuals).
Escalate the matter internally as appropriate, including informing the person or group within the
agency or organisation responsible for privacy compliance.
It may also be appropriate to report such breaches to relevant internal investigation units.
If the breach appears to involve theft or other criminal activity, it will generally be appropriate to
notify the police.
If the data breach is likely to involve a real risk of serious harm to individuals, or receive a high
level of media attention, inform the OAIC. The OAIC may be able to provide guidance and
assistance.
Other matters
Where a law enforcement agency is investigating the breach, consult the investigating agency
before making details of the breach public.
Be careful not to destroy evidence that may be valuable in determining the cause or would allow
the agency or organisation to take appropriate corrective action.
Ensure appropriate records of the suspected breach are maintained, including the steps taken to
rectify the situation and the decisions made.
Step 3: Notification
Agencies and organisations should consider the particular circumstances of the breach, and:
Notification can be an important mitigation strategy that has the potential to benefit both the
agency or organisation and the individuals affected by a data breach. The challenge is to
determine when notification is appropriate. While notification is an important mitigation
strategy, it will not always be an appropriate response to a breach. Providing notification about
low risk breaches can cause undue anxiety and de-sensitise individuals to notice. Each incident
needs to be considered on a case-by-case basis to determine whether breach notification is
required.
In general, if a data breach creates a real risk of serious harm to the individual, the affected
individuals should be notified.
Prompt notification to individuals in these cases can help them mitigate the damage by taking
steps to protect themselves. Agencies and organisations should:
take into account the ability of the individual to take specific steps to mitigate any such
harm, and
consider whether it is appropriate to inform other third parties such as the OAIC, the
police, or other regulators or professional bodies about the data breach.
Police — If theft or other crime is suspected. The Australian Federal Police should also
be contacted if the breach may constitute a threat to national security.
Insurers or others — If required by contractual obligations.
Credit card companies, financial institutions or credit reporting agencies — If their
assistance is necessary for contacting individuals or assisting with mitigating harm.
A prevention plan should suggest actions that are proportionate to the significance of the breach,
and whether it was a systemic breach or an isolated event.
The plan may include a requirement for an audit at the end of the process to ensure that the
prevention plan has been fully implemented.
While the aim should be to prevent breaches, having a breach response plan may assist in
ensuring a quick response to breaches, and greater potential for mitigating harm.
The plan could set out contact details for appropriate staff to be notified, clarify the roles and
responsibilities of staff, and document processes which will assist the agency or organisation to
contain breaches, coordinate investigations and breach notifications, and cooperate with external
investigations.
Depending on the size of the agency or organisation, consider establishing a management team
responsible for responding to personal information breaches. The team could include
representatives from relevant areas that may be needed to investigate an incident, conduct risk
assessments and make appropriate decisions (for example, privacy, senior management, IT,
public affairs, legal).
The team could convene periodically to review the breach response plan, discuss new risks and
practices, or consider incidents that have occurred in other agencies or organisations.
It may also be helpful to conduct ‘scenario’ training with team members to allow them to
develop a feel for an actual breach response. Key issues to test in such training would be
identifying when notification is an appropriate response, and the timing of that notification.
Consider researching and identifying external service providers that could assist in the event of a
data breach, such as forensics firms, public relations firms, call center providers and notification
delivery services. The contact details of the service providers could be set out in the breach
response plan. This could save time and assist in responding efficiently and effectively to a data
breach.
Enhance transparency
Include information in the agency or organisation’s privacy policy about how it responds to
breaches. This could include letting individuals know when and how they are likely to be
notified in the event of a breach, and whether the agency or organisation would ask them to
verify any contact details or other information.
This would make clear to individuals how their personal contact information is used in the event
of a breach, and may also assist individuals to avoid ‘phishing’ scam emails involving fake
breach notifications and requests that recipients verify their account details, passwords and other
personal information