Data Protection Breach Management Policy



Similar documents
Document Control. Version Control. Sunbeam House Services Policy Document. Data Breach Management Policy. Effective Date: 01 October 2014

Access Control Policy

The potential legal consequences of a personal data breach

Password Standards Policy

DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff

CAVAN AND MONAGHAN EDUCATION AND TRAINING BOARD. Data Breach Management Policy. Adopted by Cavan and Monaghan Education Training Board

Encryption Policy Version 3.0

Guidance on data security breach management

How To Protect Decd Information From Harm

Guidance on data security breach management

Third Party Security Requirements Policy

Data Security Breach Management - A Guide

THE MORAY COUNCIL. Guidance on data security breach management DRAFT. Information Assurance Group. Evidence Element 9 appendix 31

Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom

Data Security Breach Management Procedure

Data Security Breach Incident Management Policy

Data Breach Management Policy and Procedures for Education and Training Boards

Remote Access Policy

PRIVACY BREACH MANAGEMENT POLICY

DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE

Information Governance Framework. June 2015

Coláiste Pobail Bheanntraí

INFORMATION TECHNOLOGY SECURITY STANDARDS

CERTIFICATE IN DATA PROTECTION DATA SECURITY & DATA PROTECTION. Presented by Sophie More O Ferrall 9 February 2015

INFORMATION SECURITY MANAGEMENT POLICY

DATA PROTECTION AND DATA STORAGE POLICY

Information Security Policy

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

Privacy and Electronic Communications Regulations


Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager

Policy Document Control Page

Data Protection Policy. Information Security Review Group. Version Date Author Notes on Revisions

INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes

Corporate ICT & Data Management. Data Protection Policy

ESTRO PRIVACY AND DATA SECURITY NOTICE

Merthyr Tydfil County Borough Council. Data Protection Policy

Information Security Incident Management Policy

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

So the security measures you put in place should seek to ensure that:

How To Protect School Data From Harm

STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services

How To Ensure Information Security In Nhs.Org.Uk

Procedure for Managing a Privacy Breach

Mobile Phone Device Policy

Social Media in the Workplace

DATA PROTECTION POLICY

Using AWS in the context of Australian Privacy Considerations October 2015

Data Protection Policy

Cork ETB Data Breach Management Policy and Procedures

ISO27001 Controls and Objectives

Little Marlow Parish Council Registration Number for ICO Z

Privacy Policy. February, 2015 Page: 1

ISO Controls and Objectives

PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY

Information Technology Acceptable Usage Policy

DATA PROTECTION POLICY

Data Security Incident Response Plan. [Insert Organization Name]

Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10

Information Security

Data Protection Policy

005ASubmission to the Serious Data Breach Notification Consultation

AlixPartners, LLP. General Data Protection Statement

Article 29 Working Party Issues Opinion on Cloud Computing

HERTSMERE BOROUGH COUNCIL

technical factsheet 176

MANAGEMENT OF USER ACCOUNTS AND PASSWORD POLICY AUGUST Version 2.0

Service Children s Education

Privacy Incident and Breach Management Policy

Issue #5 July 9, 2015

Islington Data Protection Policy. A council-wide information policy Version 1.1 June 2014

Data Protection Policy

Caedmon College Whitby

Align Technology. Data Protection Binding Corporate Rules Processor Policy Align Technology, Inc. All rights reserved.

KEELE UNIVERSITY IT INFORMATION SECURITY POLICY

IT ACCESS CONTROL POLICY

Table of Contents. Introduction 3 What is Title Insurance? What are mortgage processing and loan servicing services? 3 This Privacy Policy 3

Dublin City University

Acceptable Use Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Personal Information Protection Act Information Sheet 11

POLICY AND PROCEDURE MANUAL

Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 EES

Network & Information Security Policy

Data and Information Security Policy

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

VMware vcloud Air HIPAA Matrix

Information Security Program Management Standard

Information Integrity & Data Management

SaaS. Business Associate Agreement

Human Resources Policy documents. Data Protection Policy

Data Processing Agreement for Oracle Cloud Services

BUSINESS ASSOCIATE ADDENDUM

UNIVERSITY OF SOUTHAMPTON DATA PROTECTION POLICY

Data Protection Act 1998 The Data Protection Policy for the Borough Council of King's Lynn & West Norfolk

Information Governance Policy

Somerset County Council - Data Protection Policy - Final

BRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS

Cyber and Data Security. Proposal form

Transcription:

Data Protection Breach Management Policy Please check the HSE intranet for the most up to date version of this policy http://hsenet.hse.ie/hse_central/commercial_and_support_services/ict/policies_and_procedures/policies/

Reader Information Title: Data Protection Breach Management Policy Purpose: To outline the approved HSE management approach to be followed in the event of data protection breach. Author: Consumer Affairs Directorate on behalf of the HSE. Publication date: February 2010 Target Audience: All HSE employees, service providers, clients and third parties that have access to the HSE s information Superseded Documents: All local breach management policies. Review Date: February 2011 Contact Details: Mr Ray Mitchell, Parliamentary and Regulatory Affairs, Health Service Executive, Park Gate St Business Centre Park Gate St Dublin, Tel No : 01 6352503 ray.mitchell@hse.ie

1.0 Purpose The Health Service Executive (HSE) is legally required under the Irish Data Protection Act 1988 & 2003 to ensure the security and confidentiality of the information/data it processes on behalf of its clients, patients and employees. Information/data is one of our most important assets and each one of us has a responsibility to ensure the security of this information. Accurate, timely, relevant and properly protected information/data is essential to the successful operation of the HSE in the provision of services to our patients and clients. Sometimes a breach of information/data security may occur because this information/data is accidentally disclosed to unauthorized persons or, lost due to a fire or flood or, stolen as result of a targeted attack or the theft of a mobile computer device. The purpose of this policy is to ensure that a national standardised management approach is implemented throughout the organisation in the event of an information/data breach. This policy is mandatory and by accessing any of the HSE s Information/data, users are agreeing to abide by the terms of this policy. 2.0 Scope This policy represents the HSE s national position and takes precedence over all other relevant policies which may have been developed at a local level. The policy applies to all HSE employees, service providers, contractors and third parties that access, use, store or process information on behalf of the HSE. This policy is authorised by the Senior Management of the HSE. 3.0 Legislation The HSE has an obligation to abide by all relevant Irish legislation and European legislation. The relevant acts, which apply in Irish law to Information Systems, include but are not limited to: The Data Protection Act (1988/2003) European Communities Data Protection Regulations, (2001) European Communities (Data Protection and Privacy in Telecommunications) Regulations (2002) Data Protection EU Directive 95/46/EC Criminal Damages Act (1991) 3

4.0 Policy It is the policy of the HSE that in the event that an information/data breach happens, the following breach management plan is strictly adhered to. It is important that each HSE Directorate puts into place their own local procedures to enable them to implement the breach management plan should such a data breach occur. There are five elements to any breach management plan: Identification and Classification Containment and Recovery Risk Assessment Notification of Breach Evaluation and Response 5.0 Breach Management Plan 5.1 Identification and Classification Directorates must put in place procedures that will allow any staff member to report any information/data security breach. It is important that all staff are aware to whom they should report such a breach. Having such a procedure in place will allow for early recognition of the breach so that it can be dealt with in the most appropriate manner. Details of the breach should be recorded accurately, including the date and time the breach occurred, the date and time it was detected, who/what reported the breach, description of the breach, details of any ICT systems involved, corroborating material such as error messages, log files, etc. In this respect, staff need to be made fully aware as to what constitutes a breach. In respect of this policy a breach maybe defined as the unintentional release of HSE confidential or personal information/data to unauthorised persons, either through the accidental disclosure, loss or theft of the information/data. 5.2 Containment and Recovery Containment involves limiting the scope and impact of the breach of data/information. If a breach occurs, Directorates should: Decide on who would take the lead in investigating the breach and ensure that the appropriate resources are made available for the investigation. Establish who in the organisation needs to be made aware of the breach and inform them of what they are expected to do to assist in the containment 4

exercise. For example, this might entail isolating a compromised section of the network, finding a lost file or piece of equipment, or simply changing access codes to server rooms, etc. Establish whether there is anything that can be done to recover losses and limit the damage the breach can cause. 5.3 Risk Assessment In assessing the risk arising from the security breach, Directorates should consider what would be the potential adverse consequences for individuals, i.e. how likely it is that adverse consequences will materialise and, in the event of materialising, how serious or substantial are they likely to be. In assessing the risk, Directorates should consider the following points: What type of Information/data is involved? How sensitive is the information/data? Are there any security mechanism s in place (e.g. password, protected, encryption)? What could the information/data tell a third party about the individual? How many individuals are affected by the breach? 5.4 Notification of Breaches All information/data breaches must be reported to the Consumer Affairs or ICT Directorate immediately. Members of staff and their line manager must complete a Data Breach Incident Report and forward (via fax or email a scanned copy) this to their local Consumer Affairs Officer for breaches involving manual (paper based) information/data or the their local ICT call centre/helpdesk for breaches involving electronic data. Under no circumstances should directorates inform the Data Protection Commissioners Office directly. The Local Consumer Affairs Officer will notify the Data Protection Commissioners office of the breach if required. Directorates should consider notifying third parties such as the Garda if necessary. 5.5 Evaluation and Response Subsequent to any information/data security breach a thorough review of the incident should occur. The purpose of this review is to ensure that the steps taken during the incident were appropriate and to identify areas that may need to be improved. 5

Any recommended changed to policies and/or procedures should be documented and implemented as soon as possible thereafter. Each Directorate should identify a group of people within the organisation who will be responsible for reacting to reported breaches of security. 6.0 Roles and Responsibilities 6.1 Line Managers Line Managers are responsible for: The implementation of this policy and all other relevant HSE policies within the business areas for which they are responsible. Ensuring that all HSE employees who report to them are made aware of and are instructed to comply with this policy and all other related HSE policies. Consulting with the Consumer Affairs &/or the ICT Directorate in relation to the appropriate procedures to follow when a breach of this policy has occurred. 6.2 Users Each user is responsible for: Complying with the terms of this policy and all other relevant HSE policies, procedures, regulations and applicable legislation; Respecting and protecting the privacy and confidentiality of the information they process at all times; Reporting all misuse and breaches of this policy to their line manager. 7.0 Enforcement The HSE reserves the right to take such action as it deems appropriate against users who breach the conditions of this policy. HSE employees who breach this policy may be denied access to the organizations information technology resources, and maybe subject to disciplinary action, including suspension and dismissal as provided for in the HSE disciplinary procedure. 8.0 Review & Update This policy will be reviewed and updated annually or more frequently if necessary, to ensure that any changes to the HSE s organisation structure and business practices are properly reflected in the policy. 6