Once more unto the breach... Dealing with Personal Data Security Breaches. Helen Williamson Information Governance Officer



Similar documents
Guidance on data security breach management

Guidance on data security breach management

DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE

Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom

Data Protection and Information Security. Procedure for reporting a breach of data security. April 2013

Data Security Breach Management - A Guide

So the security measures you put in place should seek to ensure that:

NIGB. Information Governance Untoward Incident Reporting and Management Advice for Local Authorities

THE MORAY COUNCIL. Guidance on data security breach management DRAFT. Information Assurance Group. Evidence Element 9 appendix 31

Data Breach Trends October 2015

Dealing With Information Rights Concerns

PARLIAMENTARY AND HEALTH SERVICE OMBUDSMAN

Privacy and Electronic Communications Regulations

Incident reporting procedure

The potential legal consequences of a personal data breach

Data Security Breach Incident Management Policy

Human Resources Policy documents. Data Protection Policy

Information security incident reporting procedure

Data Protection and Community Councils Briefing Note

GUIDE TO MANAGING DATA BREACHES

Data Protection Breach Management Policy

Data Protection Policy

Merthyr Tydfil County Borough Council. Data Protection Policy

Information Security

Security Incident Management Policy

Auditing data protection a guide to ICO data protection audits

Information Governance

PAPER RECORDS SECURE HANDLING AND TRANSIT POLICY

Data Protection and Information Security Policy and Procedure

Little Marlow Parish Council Registration Number for ICO Z

Information Security Incident Management Policy

Islington Data Protection Policy. A council-wide information policy Version 1.1 June 2014

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012

Rick Parsons Information Governance Officer County Hall

Corporate ICT & Data Management. Data Protection Policy

INFORMATION GOVERNANCE AND DATA PROTECTION POLICY

Data Security Breach Management Procedure

Data Protection Act 1998 The Data Protection Policy for the Borough Council of King's Lynn & West Norfolk

DATA PROTECTION CORPORATE POLICY

A practical guide to IT security

DATA AND PAYMENT SECURITY PART 1

Data Protection Breach Reporting Procedure

HERTSMERE BOROUGH COUNCIL

HIPAA Privacy and Security

Information Incident Management and Reporting Procedures

SAS TRUSTEE CORPORATION ( STC )

HIPAA. New Breach Notification Risk Assessment and Sanctions Policy. Incident Management Policy. Focus on: For breaches affecting 1 3 individuals

Information Incident Management and Reporting Procedures

Hacks, apps and espionage - how protected are you against cyber crime? Top 10 Legal Need-to-Knows

Operating procedure. Managing customer contacts

Somerset County Council - Data Protection Policy - Final

Information Incident Management Policy

Data Protection Procedures

Statutory duty of candour with criminal sanctions Briefing paper on existing accountability mechanisms

Everyone in the workplace has a legal duty to protect the privacy of information about individuals. AEP/BELB/LJ/2010 Awareness Session

Summary of the Dutch Data Protection Authority s guidelines for the Data Breach Notification Act

Notification of data security breaches to the Information Commissioner s

Dean Bank Primary and Nursery School. Data Protection Policy

Community First Health Plans Breach Notification for Unsecured PHI

UoB Risk Assessment Methodology

Data Protection Avoiding Information Commissioner Fines. Caroline Egan 5 June 2014

CAVAN AND MONAGHAN EDUCATION AND TRAINING BOARD. Data Breach Management Policy. Adopted by Cavan and Monaghan Education Training Board

NHS England Complaints Policy

Data Protection Act. Conducting privacy impact assessments code of practice

On the edge Lexis PSL Restructuring & Insolvency

HIPAA and Privacy Policy Training

Policy Document Control Page

Document 12. Open Awards Malpractice and Maladministration Policy and Procedures

PRIVACY BREACH MANAGEMENT POLICY

Procedure for Managing a Privacy Breach

EXECUTIVE DECISION NOTICE. ICT, Communications and Media. Councillor John Taylor. Deputy Executive Leader

Findings from ICO audits and reviews of community healthcare providers. June 2013 to December 2014

Document Control. Version Control. Sunbeam House Services Policy Document. Data Breach Management Policy. Effective Date: 01 October 2014

Human Resources and Data Protection

IP-PGN-14 Part of NTW(O)05 Incident Policy

The elected members of a local council are likely to have three different roles.

Security breaches: A regulatory overview. Jonathan Bamford Head of Strategic Liaison

DATA PROTECTION POLICY

Data Protection Policy

Mitigating and managing cyber risk: ten issues to consider

Creating a sporting habit for life. Sport England Complaints Procedure

Zip It! Feds, State Strengthen Privacy Protection. Practice Management Feature July Tex Med. 2012;108(7):33-37.

nationalcarestandards

Data Breach Management Policy and Procedures for Education and Training Boards

NHS Waltham Forest Clinical Commissioning Group Information Governance Strategy

Applying the legislation

KEELE UNIVERSITY IT INFORMATION SECURITY POLICY

Data Protection and Information Security: The top 5 risks for November 2012

PROTECTING PATIENT PRIVACY and INFORMATION SECURITY

Photography and filming in schools Code of Practice

SCOTLAND S COMMISSIONER FOR CHILDREN AND YOUNG PEOPLE STANDARD CONDITIONS OF CONTRACT FOR SERVICES

HIPAA Happenings in Hospital Systems. Donna J Brock, RHIT System HIM Audit & Privacy Coordinator

Personal Information Protection Act Information Sheet 11

Cyber Security : preventing and mitigating incidents. Alexander Brown Robert Allen

Data Protection Act. Privacy & Security in the Information Age. April 26, Ministry of Communications, Ghana

Information Security Policy

Security Is Everyone s Concern:

Corporate Policy and Strategy Committee

Data breach notification guide: A guide to handling personal information security breaches

1. Introduction Statement of Policy The Eight Principles of Data Protection Scope Roles and Responsibilities.

Transcription:

Once more unto the breach... Dealing with Personal Data Security Breaches Helen Williamson Information Governance Officer

Aims of the session What are we going to look at? What is a data security breach? Why do breaches need managing? What are the risks? Our experiences - how Sheffield Hallam University has managed breaches and lessons learnt

Why does data security matter? Data Protection Act requirements Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss, destruction or damage to personal data. The 7 th Data Protection Principle

ICO Corporate Plan Published 25 March 2014 The plan confirms that we will be adopting a fresh approach to handling people s data protection concerns, with cases brought to our office being increasingly used to identify broader data protection problems and improve organisations current practices.

What is a Data Security Breach? an event or series of events leading to the unintentional or unauthorised disclosure of information which compromises the security, confidentiality or integrity of data

Unauthorised disclosure Theft Loss Security Breach Records not disposed of securely Unauthorised access Equipment on which data is stored is not disposed of securely Hacking

Near Misses and Close Calls i.e. the point just before the point of no return helps to identify risk areas and to manage those risks before breach incidents occur

Civil action: Compensation and legal fees Loss of trust amongst stakeholders Criminal offences Staff disciplinary issue Damage and distress to data subjects Possible consequences and actions Monetary penalties or fines Complaints from data subjects Investigation and enforcement action by Information Commissioner Reputational damage and negative press coverage

The Fine is Right!

What is the maximum ICO fine for a breach of the DPA? A. 10,000 B. 50,000 C. 100,000 D. 500,000 E. 1,000,000

How much is the highest fine issued so far? A. 175,000 B. 225,000 C. 275,000 D. 325,000 E. 424,000

Which security incident resulted in the highest fine? A. Theft of a bag containing papers relating to a child sex abuse victim B. 3000 patient records found on second hand computer bought on online auction site C. NMC loses 3 DVDs of student fitness to practice case inc. details of vulnerable child D. Sony website hacked compromising the details of millions of customers inc. passwords and payment card details. E. Bank of Scotland repeatedly faxed customer details to wrong recipients

A Question of Data Security What happens next?

New member of staff uses hybrid copier/scanner/fax machine in open plan office A. Presses fax instead of scan and sends documents to last number dialled B. Scans it but sends it to a shared drive which is accessible to 50 other staff C. Presses copy instead of scan, leaves machine running and returns to find copies gone D. Collects copies from printer and also picks up someone else's documents which all go in same envelope to external third party

Member of staff's IT account hacked A. Member of staff used work email for personal banking and responded to phishing email. B. Student complainant saw login on post it note on her desk during appointment C. Gave out login details to PA on bus unaware that a fellow passenger recognised login as SHU D. Family member added key logger to machine

External assessor takes application forms away from panel meeting A. Reads papers on train and fellow passengers shoulder surfs B. Leaves papers in station toilets and returns to find that they have disappeared C. Sees that applicant is sister of pop star and sells information to press D. Realises one of the applicants is a neighbour and posts information on Facebook

Data Security Breach Management Procedure Our procedure and experiences Short procedure devised in 2009 in line with ICO guidance and following series of high profile data losses, e.g. HMRC child benefit records Feedback from auditors and experience led to review in 2011/12 Revised procedure issued in 2012.

Aims of the Procedure provide clarity about who shall do what, why and when at each point once a security breach has been identified; ensure that action is properly coordinated limit the damage caused by the breach identify improvements in data security which will prevent similar breaches in the future ensure that there is a proper audit trail of actions and decisions.

1 Discovery Reporting The Procedure: 6 stages 2 3 Assemble Data Breach Team Containment Recovery 4 Notification 5 Evaluation Response 6 Implementation Audit

Discovery and Reporting Relies on one of our 4000+ staff recognising a data security breach and knowing/remembering who to report it to Information Governance Officer takes initial account of breach: - which data have been lost or compromised - how the data have been lost or compromised - when the breach occurred - where it occurred. Initial breach level (minor or major) determines who attends breach team

Assembling a Data Breach Team Drawing on wider pool of expertise and specialisms Value in unpicking incident using different perspectives Template/checklist for meetings to ensure all aspects covered Gives added weight

Alignment with other processes HR processes - staff disciplinary Student and staff complaints Internal and external communications Fraud response plan Major incident plan and business continuity

Notification When and what to communicate to stakeholders What is the harm or likely harm to individuals? Could notification help individuals to mitigate the risk? Is there a danger of "over notifying" which may cause disproportionate enquiries or distress? Should the ICO be notified? Is there a need to notify other third parties? Should the media be informed or is it necessary to prepare a response to possible media enquiries? Is there a need for a contact procedure for further information or questions, e.g. a helpline number or web page? How urgent is the need to inform individuals or organisations?

Responding to the ICO General points Usually required within 3-4 weeks of receiving ICO letter Full response usually only get one opportunity so tell them everything they need to know Provide evidence of what has been done No need to quote lots of legal jargon at them

Case Study - Student Email The breach Member of student administration staff emailed hundreds of students returning from placement year using SHU and personal email addresses. Entered all addresses into the "To" field instead of "Bcc" field. Effect was to share each email address with all other recipients. One student complained to the ICO that we had shared their address

Case Study - Student Emails Putting the Procedure into Action Assembled team Minuted meeting using template Investigation Emails to all affected students Email apology to the complainant Guidance to staff delivered via Communication Plan Changes to email set up Publicised email auto-forward function to students Review Meeting

Our response to the ICO What we included Background/context about University and HE Data Security Breach Management Procedure Action taken Notes of meetings Copies of emails/notifications/apologies Advice issued to staff Screen shots of information posted on intranet How the issue will be addressed in staff training Details of planned review

Outcome of ICO's investigation Key points in the letter from the caseworker Compliance unlikely 7 th Data Protection Principle breached The University's data security breach management procedure is "comprehensive" No enforcement/regulatory action in this case "Thank you for your timely and very thorough investigation of this complaint and your very detailed response to us."

Strengths and benefits of Data Breach Management What we feel works well Good procedure: - Comprehensive - Enables us to deal with broad range of incidents - Integrates with other procedures Team Enlisting help from internal communications team for emergency communications Thorough response to ICO with evidence of actions Template for meetings

Lessons Learnt and Future Challenges Further improvement of awareness of the procedure and the need to report incidents and near misses Staff anxiety about procedure and meetings fears about potential consequences Difficulty in assembling senior staff quickly Small incidents with no wider consequences dealt with by email and signed off by Chair Better communication of lessons learnt across the University