Once more unto the breach... Dealing with Personal Data Security Breaches. Helen Williamson Information Governance Officer
|
|
|
- Rosanna Riley
- 10 years ago
- Views:
Transcription
1 Once more unto the breach... Dealing with Personal Data Security Breaches Helen Williamson Information Governance Officer
2 Aims of the session What are we going to look at? What is a data security breach? Why do breaches need managing? What are the risks? Our experiences - how Sheffield Hallam University has managed breaches and lessons learnt
3 Why does data security matter? Data Protection Act requirements Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss, destruction or damage to personal data. The 7 th Data Protection Principle
4 ICO Corporate Plan Published 25 March 2014 The plan confirms that we will be adopting a fresh approach to handling people s data protection concerns, with cases brought to our office being increasingly used to identify broader data protection problems and improve organisations current practices.
5 What is a Data Security Breach? an event or series of events leading to the unintentional or unauthorised disclosure of information which compromises the security, confidentiality or integrity of data
6 Unauthorised disclosure Theft Loss Security Breach Records not disposed of securely Unauthorised access Equipment on which data is stored is not disposed of securely Hacking
7 Near Misses and Close Calls i.e. the point just before the point of no return helps to identify risk areas and to manage those risks before breach incidents occur
8 Civil action: Compensation and legal fees Loss of trust amongst stakeholders Criminal offences Staff disciplinary issue Damage and distress to data subjects Possible consequences and actions Monetary penalties or fines Complaints from data subjects Investigation and enforcement action by Information Commissioner Reputational damage and negative press coverage
9 The Fine is Right!
10 What is the maximum ICO fine for a breach of the DPA? A. 10,000 B. 50,000 C. 100,000 D. 500,000 E. 1,000,000
11 How much is the highest fine issued so far? A. 175,000 B. 225,000 C. 275,000 D. 325,000 E. 424,000
12 Which security incident resulted in the highest fine? A. Theft of a bag containing papers relating to a child sex abuse victim B patient records found on second hand computer bought on online auction site C. NMC loses 3 DVDs of student fitness to practice case inc. details of vulnerable child D. Sony website hacked compromising the details of millions of customers inc. passwords and payment card details. E. Bank of Scotland repeatedly faxed customer details to wrong recipients
13 A Question of Data Security What happens next?
14 New member of staff uses hybrid copier/scanner/fax machine in open plan office A. Presses fax instead of scan and sends documents to last number dialled B. Scans it but sends it to a shared drive which is accessible to 50 other staff C. Presses copy instead of scan, leaves machine running and returns to find copies gone D. Collects copies from printer and also picks up someone else's documents which all go in same envelope to external third party
15 Member of staff's IT account hacked A. Member of staff used work for personal banking and responded to phishing . B. Student complainant saw login on post it note on her desk during appointment C. Gave out login details to PA on bus unaware that a fellow passenger recognised login as SHU D. Family member added key logger to machine
16 External assessor takes application forms away from panel meeting A. Reads papers on train and fellow passengers shoulder surfs B. Leaves papers in station toilets and returns to find that they have disappeared C. Sees that applicant is sister of pop star and sells information to press D. Realises one of the applicants is a neighbour and posts information on Facebook
17 Data Security Breach Management Procedure Our procedure and experiences Short procedure devised in 2009 in line with ICO guidance and following series of high profile data losses, e.g. HMRC child benefit records Feedback from auditors and experience led to review in 2011/12 Revised procedure issued in 2012.
18 Aims of the Procedure provide clarity about who shall do what, why and when at each point once a security breach has been identified; ensure that action is properly coordinated limit the damage caused by the breach identify improvements in data security which will prevent similar breaches in the future ensure that there is a proper audit trail of actions and decisions.
19 1 Discovery Reporting The Procedure: 6 stages 2 3 Assemble Data Breach Team Containment Recovery 4 Notification 5 Evaluation Response 6 Implementation Audit
20 Discovery and Reporting Relies on one of our staff recognising a data security breach and knowing/remembering who to report it to Information Governance Officer takes initial account of breach: - which data have been lost or compromised - how the data have been lost or compromised - when the breach occurred - where it occurred. Initial breach level (minor or major) determines who attends breach team
21 Assembling a Data Breach Team Drawing on wider pool of expertise and specialisms Value in unpicking incident using different perspectives Template/checklist for meetings to ensure all aspects covered Gives added weight
22 Alignment with other processes HR processes - staff disciplinary Student and staff complaints Internal and external communications Fraud response plan Major incident plan and business continuity
23 Notification When and what to communicate to stakeholders What is the harm or likely harm to individuals? Could notification help individuals to mitigate the risk? Is there a danger of "over notifying" which may cause disproportionate enquiries or distress? Should the ICO be notified? Is there a need to notify other third parties? Should the media be informed or is it necessary to prepare a response to possible media enquiries? Is there a need for a contact procedure for further information or questions, e.g. a helpline number or web page? How urgent is the need to inform individuals or organisations?
24 Responding to the ICO General points Usually required within 3-4 weeks of receiving ICO letter Full response usually only get one opportunity so tell them everything they need to know Provide evidence of what has been done No need to quote lots of legal jargon at them
25 Case Study - Student The breach Member of student administration staff ed hundreds of students returning from placement year using SHU and personal addresses. Entered all addresses into the "To" field instead of "Bcc" field. Effect was to share each address with all other recipients. One student complained to the ICO that we had shared their address
26 Case Study - Student s Putting the Procedure into Action Assembled team Minuted meeting using template Investigation s to all affected students apology to the complainant Guidance to staff delivered via Communication Plan Changes to set up Publicised auto-forward function to students Review Meeting
27 Our response to the ICO What we included Background/context about University and HE Data Security Breach Management Procedure Action taken Notes of meetings Copies of s/notifications/apologies Advice issued to staff Screen shots of information posted on intranet How the issue will be addressed in staff training Details of planned review
28 Outcome of ICO's investigation Key points in the letter from the caseworker Compliance unlikely 7 th Data Protection Principle breached The University's data security breach management procedure is "comprehensive" No enforcement/regulatory action in this case "Thank you for your timely and very thorough investigation of this complaint and your very detailed response to us."
29 Strengths and benefits of Data Breach Management What we feel works well Good procedure: - Comprehensive - Enables us to deal with broad range of incidents - Integrates with other procedures Team Enlisting help from internal communications team for emergency communications Thorough response to ICO with evidence of actions Template for meetings
30 Lessons Learnt and Future Challenges Further improvement of awareness of the procedure and the need to report incidents and near misses Staff anxiety about procedure and meetings fears about potential consequences Difficulty in assembling senior staff quickly Small incidents with no wider consequences dealt with by and signed off by Chair Better communication of lessons learnt across the University
Guidance on data security breach management
ICO lo Guidance on data security breach management Data Protection Act Contents... 1 Data Protection Act... 1 Overview... 1 Containment and recovery... 2 Assessing the risks... 3 Notification of breaches...
Guidance on data security breach management
Guidance on data security breach management Organisations which process personal data must take appropriate measures against unauthorised or unlawful processing and against accidental loss, destruction
DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE
DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE 1. INTRODUCTION Annex C 1.1 Surrey Heath Borough Council (SHBC) processes personal data and must respond appropriately against unauthorised or unlawful
Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom
Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom Indirani 02/11/2009 Draft 2 Include JG s comments Jackie Groom
Data Protection and Information Security. Procedure for reporting a breach of data security. April 2013
Data Protection and Information Security Procedure for reporting a breach of data security April 2013 Page 1 of 6 Created on: 01/04/2009 Contents 1 Introduction... 3 2 Data Classification... 3 3 What Is
So the security measures you put in place should seek to ensure that:
Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.
NIGB. Information Governance Untoward Incident Reporting and Management Advice for Local Authorities
Information Governance Untoward Incident Reporting and Management Advice for Local Authorities March 2013 Contents Page 1. The Role of the NIGB.....3 2. Introduction...4 3. Background Information...6 4.
THE MORAY COUNCIL. Guidance on data security breach management DRAFT. Information Assurance Group. Evidence Element 9 appendix 31
THE MORAY COUNCIL Guidance on data security breach management Information Assurance Group DRAFT Based on the ICO Guidance on data security breach management under the Data Protection Act 1 Document Control
Privacy and Electronic Communications Regulations
ICO lo Notification of PECR security breaches Privacy and Electronic Communications Regulations Contents Introduction... 2 Overview... 2 Relevant security breaches... 3 What is a service provider?... 3
Incident reporting procedure
Incident reporting procedure Responsible Officer Author Date effective from Aug 2009 Date last amended Aug 2009 Review date July 2012 Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance
The potential legal consequences of a personal data breach
The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.
Data Security Breach Incident Management Policy
Data Security Breach Incident Management Policy Contents 1. Background... 1 2. Aim... 1 3. Definition... 2 4. Scope... 2 5. Responsibilities... 2 6. Data Classification... 2 7. Data Security Breach Reporting...
Human Resources Policy documents. Data Protection Policy
Policy documents Aims of the Policy apetito is committed to meeting its obligations under data protection law. As a business, apetito handles a range of Personal Data relating to its customers, staff and
Information security incident reporting procedure
Information security incident reporting procedure Responsible Officer Author Date effective from 2009 Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance Manager Date last amended
GUIDE TO MANAGING DATA BREACHES
8 MAY 2015 CONTENT PURPOSE OF THE GUIDE 3 INTRODUCTION 4 HOW DATA BREACHES COULD OCCUR 5 RESPONDING TO A DATA BREACH 6 i. DATA BREACH MANAGEMENT PLAN 6 ii. CONTAINING THE BREACH 7 iii. ASSESSING RISK AND
Data Protection Breach Management Policy
Data Protection Breach Management Policy Please check the HSE intranet for the most up to date version of this policy http://hsenet.hse.ie/hse_central/commercial_and_support_services/ict/policies_and_procedures/policies/
Data Protection Policy
Data Protection Policy September 2015 Contents 1. Scope 2. Purpose 3. Data protection roles 4. Staff training and guidance 5. About the Data Protection Act 1998 6. Policy 7. The Information Commissioner's
Merthyr Tydfil County Borough Council. Data Protection Policy
Merthyr Tydfil County Borough Council Data Protection Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of the
Information Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
Security Incident Management Policy
Security Incident Management Policy January 2015 Document Version 2.4 Document Status Owner Name Owner Job Title Published Martyn Ward Head of ICT Business Delivery Document ref. Approval Date 27/01/2015
Auditing data protection a guide to ICO data protection audits
Auditing data protection a guide to ICO data protection audits Contents Executive summary 3 1. Audit programme development 5 Audit planning and risk assessment 2. Audit approach 6 Gathering evidence Audit
PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY
PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY CORPORATE POLICY Document Control Title Paper Records Secure Handling and Transit Policy Author Information Governance Manager ** Owner SIRO/CIARG Subject
Little Marlow Parish Council Registration Number for ICO Z3112320
Data Protection Policy Little Marlow Parish Council Registration Number for ICO Z3112320 Adopted 2012 Reviewed 23 rd February 2016 Introduction The Parish Council is fully committed to compliance with
Information Security Incident Management Policy
Information Security Incident Management Policy Version: 1.1 Date: September 2012 Unclassified Version Control Date Version Comments November 2011 1.0 First draft for comments to IT Policy & Regulation
Islington Data Protection Policy. A council-wide information policy Version 1.1 June 2014
A council-wide information policy Version 1.1 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document is distributed under the Creative Commons Attribution 2.5 license.
HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012
HIPAA Privacy and Security Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 Goals and Objectives Course Goal: To introduce the staff of Munson Healthcare to the concepts
Rick Parsons Information Governance Officer County Hall 01865 323593 [email protected]
Rick Parsons Information Governance Officer County Hall 01865 323593 [email protected] 1 THE DATA PROTECTION ACT 1998 2 Requirements of the Act Roles & Responsibilities Best Practice 3 The
Corporate ICT & Data Management. Data Protection Policy
90 Corporate ICT & Data Management Data Protection Policy Classification: Unclassified Date Created: January 2012 Date Reviewed January Version: 2.0 Author: Owner: Data Protection Policy V2 1 Version Control
Data Protection Act 1998 The Data Protection Policy for the Borough Council of King's Lynn & West Norfolk
Data Protection Act 1998 The for the Borough Council of King's Lynn & West Norfolk 1 Contents Introduction 3 1. Statement of Intent 4 2. Fair Obtaining I Processing 5 3. Data Uses and Processes 6 4. Data
DATA PROTECTION CORPORATE POLICY
DATA PROTECTION CORPORATE POLICY Information Management V1.1 03 July 2012 Not protectively marked This policy must be complied with fully by all Members, Officers Agents and Contractors of Plymouth City
A practical guide to IT security
Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or
DATA AND PAYMENT SECURITY PART 1
STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of
Data Protection Breach Reporting Procedure
Central Bedfordshire Council www.centralbedfordshire.gov.uk Data Protection Breach Reporting Procedure October 2015 Security Classification: Not Protected 1 Approval History Version No Approved by Approval
HERTSMERE BOROUGH COUNCIL
HERTSMERE BOROUGH COUNCIL DATA PROTECTION POLICY October 2007 1 1. Introduction Hertsmere Borough Council ( the Council ) is fully committed to compliance with the requirements of the Data Protection Act
HIPAA Privacy and Security
HIPAA Privacy and Security Cindy Cummings, RHIT February, 2015 1 HIPAA Privacy and Security The regulation is designed to safeguard Protected Health Information referred to PHI AND electronic Protected
SAS TRUSTEE CORPORATION ( STC )
SAS TRUSTEE CORPORATION ( STC ) POLICY ON USE OF EMPLOYER COMMUNICATION DEVICES AND WORKPLACE SURVEILLANCE under the Workplace Surveillance Act 2005 File: B915 May 2011 Version 3 INDEX Policy Statement...
HIPAA. New Breach Notification Risk Assessment and Sanctions Policy. Incident Management Policy. Focus on: For breaches affecting 1 3 individuals
HIPAA New Breach Notification Risk Assessment and Sanctions Policy Incident Management Policy For breaches affecting 1 3 individuals +25 individuals + 500 individuals Focus on: analysis documentation PHI
Operating procedure. Managing customer contacts
Operating procedure Managing customer contacts Contents 1 Introduction 2 Staff welfare 3 Application and context of this procedure 4 Defining and dealing with challenging customer behaviour 5 Equality
Somerset County Council - Data Protection Policy - Final
Organisation Title Author Owner Protective Marking Somerset County Council Data Protection Policy - Final Peter Grogan Information Governance Manager Unclassified POLICY ON A PAGE Somerset County Council
Information Incident Management Policy
Information Incident Management Policy Change History Version Date Description 0.1 04/01/2013 Draft 0.2 26/02/2013 Replaced procedure details with broad principles 0.3 27/03/2013 Revised following audit
Data Protection Procedures
Data Protection Procedures PROCEDURE OVERVIEW: This Procedure outlines Down District Council s ( the Council ) commitment to the Data Protection Act 1998 ( the Act ) and provides a framework for the Council
Statutory duty of candour with criminal sanctions Briefing paper on existing accountability mechanisms
Statutory duty of candour with criminal sanctions Briefing paper on existing accountability mechanisms Background In calling for the culture of the NHS to become more open and honest, Robert Francis QC,
Summary of the Dutch Data Protection Authority s guidelines for the Data Breach Notification Act
Summary of the Dutch Data Protection Authority s guidelines for the Data Breach Notification Act On 1 January 2016, the Dutch Data Breach Notification Act will enter into force. The Dutch DPA issued Guidelines
Notification of data security breaches to the Information Commissioner s
ICO lo Notification of data security breaches to the Information Commissioner s Data Protection Act Contents Overview... 2 What the DPA says... 2 Reporting a breach... 2 Potential detriment to data subjects...
Dean Bank Primary and Nursery School. Data Protection Policy
Dean Bank Primary and Nursery School Data Protection Policy January 2015 Data Protection Policy Dean Bank Primary and Nursery School handles increasing amounts of personal information and have a statutory
UoB Risk Assessment Methodology
[Type here] UoB Risk Assessment Methodology The Risk Assessment Methodology describes how information security risk will be managed, including guidance for assessing, scoring, choosing acceptance or treatment
CAVAN AND MONAGHAN EDUCATION AND TRAINING BOARD. Data Breach Management Policy. Adopted by Cavan and Monaghan Education Training Board
CAVAN AND MONAGHAN EDUCATION AND TRAINING BOARD Data Breach Management Policy Adopted by Cavan and Monaghan Education Training Board on 11 September 2013 Policy Safeguarding personally identifiable information
NHS England Complaints Policy
NHS England Complaints Policy 1 2 NHS England Complaints Policy NHS England Policy and Corporate Procedures Version number: 1.1 First published: September 2014 Prepared by: Kerry Thompson, Senior Customer
Data Protection Act. Conducting privacy impact assessments code of practice
Data Protection Act Conducting privacy impact assessments code of practice 1 Conducting privacy impact assessments code of practice Data Protection Act Contents Information Commissioner s foreword... 3
On the edge Lexis PSL Restructuring & Insolvency
On the edge Lexis PSL Restructuring & Insolvency Data protection law for insolvency practitioners November 2014 Welcome to your third edition of On the edge, a series of guides highlighting a selection
HIPAA and Privacy Policy Training
HIPAA and Privacy Policy Training July 2015 1 This training addresses the requirements for maintaining the privacy of confidential information received from HFS and DHS (the Agencies). During this training
Policy Document Control Page
Policy Document Control Page Title Title: Data Protection Policy Version: 3 Reference Number: CO59 Keywords: Data, access, principles, protection, Act. Data Subject, Information Supersedes Supersedes:
Document 12. Open Awards Malpractice and Maladministration Policy and Procedures
Open Awards Malpractice and Maladministration Policy and Procedures Page 1 of 14 Open Awards Malpractice and Maladministration Policy and Procedures Policy Statement Open Awards is committed to ensuring
PRIVACY BREACH MANAGEMENT POLICY
PRIVACY BREACH MANAGEMENT POLICY DM Approval: Effective Date: October 1, 2014 GENERAL INFORMATION Under the Access to Information and Protection of Privacy Act (ATIPP Act) public bodies such as the Department
Procedure for Managing a Privacy Breach
Procedure for Managing a Privacy Breach (From the Privacy Policy and Procedures available at: http://www.mun.ca/policy/site/view/index.php?privacy ) A privacy breach occurs when there is unauthorized access
Document Control. Version Control. Sunbeam House Services Policy Document. Data Breach Management Policy. Effective Date: 01 October 2014
Document Control Policy Title Data Breach Management Policy Policy Number 086 Owner Information & Communication Technology Manager Contributors Information & Communication Technology Team Version 1.0 Date
Human Resources and Data Protection
Human Resources and Data Protection Contents 1. Policy Statement... 1 2. Scope... 2 3. What is personal data?... 2 4. Processing data... 3 5. The eight principles of the Data Protection Act... 4 6. Council
IP-PGN-14 Part of NTW(O)05 Incident Policy
Incident Policy Practice Guidance Note Information Governance Incident Reporting Management V01 Date Issued Planned Review PGN No: Issue 1 October 2014 October 2017 IP-PGN-14 Part of NTW(O)05 Incident
Security breaches: A regulatory overview. Jonathan Bamford Head of Strategic Liaison
Security breaches: A regulatory overview Jonathan Bamford Head of Strategic Liaison Security breaches and the DPA Data controllers security obligation - principle 7 of the DPA o Appropriate technical and
DATA PROTECTION POLICY
DATA PROTECTION POLICY Version 1.3 April 2014 Contents 1 POLICY STATEMENT...2 2 PURPOSE....2 3 LEGAL CONTEXT AND DEFINITIONS...2 3.1 Data Protection Act 1998...2 3.2 Other related legislation.....4 3.3
Data Protection Policy
Data Protection Policy CONTENTS Introduction...2 1. Statement of Intent...2 2. Fair Processing or Privacy Statement...3 3. Data Uses and Processes...4 4. Data Quality and Integrity...4 5. Technical and
Mitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
nationalcarestandards
nationalcarestandards dignity privacy choice safety realising potential equality and diversity SCOTTISH EXECUTIVE Making it work together nationalcarestandards dignity privacy choice safety realising potential
KEELE UNIVERSITY IT INFORMATION SECURITY POLICY
Contents 1. Introduction 2. Objectives 3. Scope 4. Policy Statement 5. Legal and Contractual Requirements 6. Responsibilities 7. Policy Awareness and Disciplinary Procedures 8. Maintenance 9. Physical
PROTECTING PATIENT PRIVACY and INFORMATION SECURITY
PROTECTING PATIENT PRIVACY and INFORMATION SECURITY 2 PROTECTING PATIENT PRIVACY AND INFORMATION SECURITY PROTECTING PATIENT PRIVACY AND INFORMATION SECURITY 3 INTRODUCTION As an agency employee, student,
Photography and filming in schools Code of Practice
Photography and filming in schools Code of Practice Data Protection compliance September 2010 Photography and filming in schools September 2010 1 Contents 1. About this code 3 2. Complying with the Data
SCOTLAND S COMMISSIONER FOR CHILDREN AND YOUNG PEOPLE STANDARD CONDITIONS OF CONTRACT FOR SERVICES
SCOTLAND S COMMISSIONER FOR CHILDREN AND YOUNG PEOPLE STANDARD CONDITIONS OF CONTRACT FOR SERVICES 1 1 Definitions In these conditions:- We means Scotland s Commissioner for Children and Young People,
HIPAA Happenings in Hospital Systems. Donna J Brock, RHIT System HIM Audit & Privacy Coordinator
HIPAA Happenings in Hospital Systems Donna J Brock, RHIT System HIM Audit & Privacy Coordinator HIPAA Health Insurance Portability and Accountability Act of 1996 Title 1 Title II Title III Title IV Title
Personal Information Protection Act Information Sheet 11
Notification of a Security Breach Personal Information Protection Act Information Sheet 11 Introduction Personal information is used by organizations for a variety of purposes: retail and grocery stores
Data Protection Act. Privacy & Security in the Information Age. April 26, 2013. Ministry of Communications, Ghana
Data Protection Act Privacy & Security in the Information Age April 26, 2013 Agenda Privacy in The Information Age The right to privacy Why We Need Legislation Purpose of the Act The Data Protection Act
Information Security Policy
Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Alan Lawrie ehealth Strategy Group Implementation Date: September
Security Is Everyone s Concern:
Security Is Everyone s Concern: What a Practice Needs to Know About ephi Security Mert Gambito Hawaii HIE Compliance and Privacy Officer July 26, 2014 E Komo Mai! This session s presenter is Mert Gambito
Corporate Policy and Strategy Committee
Corporate Policy and Strategy Committee 10am, Tuesday, 30 September 2014 Information Governance Policies Item number Report number Executive/routine Wards All Executive summary Information is a key asset
Data breach notification guide: A guide to handling personal information security breaches
Data breach notification guide: A guide to handling personal information security breaches August 2014 The Office of the Australian Information Commissioner (OAIC) was established on 1 November 2010 by
1. Introduction... 3. 2. Statement of Policy. 3. 3. The Eight Principles of Data Protection... 4. 4. Scope... 5. 5. Roles and Responsibilities.
Data Protection Policy 2011 Contents Page 1. Introduction... 3 2. Statement of Policy. 3 3. The Eight Principles of Data Protection...... 4 4. Scope.... 5 5. Roles and Responsibilities. 5 6. Development
