Answer yes if organisation has robust detection, investigation and reporting procedures in place for all personal data breaches. This should include assessing the likely risk to individuals as a result of the breach, informing affected individuals without undue delay, and documenting the facts surrounding personal data breaches in a Breach Log. Please provide details about your processes surrounding a personal data breach in the notes section, including uploading any relevant documentation (as a PDF file).
A personal data breach means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data. This includes breaches that are the result of both accidental and deliberate causes.
Personal data breach examples include:
Under many nation and state data privacy and protection laws you must maintain your own record of all personal data breach events in an inventory or log.
A useful guide on what you must do after becoming aware of a breach was published by the UK’s data protection authority the ICO and can be found here. This can be useful to inform the content of an incident management playbook which you can use to respond to security events involving a personal data breach.
You can download a template of a Data Breach Log from the ICO here.
If you would like to contribute to this article or provide feedback, please email knowledge@riskledger.com. Contributors will be recognised on our contributors page.