Security breaches: A regulatory overview. Jonathan Bamford Head of Strategic Liaison



Similar documents
Privacy and Electronic Communications Regulations

How To Deal With A Data Breach In The European Law

The potential legal consequences of a personal data breach

Notification of data security breaches to the Information Commissioner s

DATA AND PAYMENT SECURITY PART 1

Renfrewshire Council. Data protection audit report. Executive summary January 2013

Dealing with data breaches in Europe and beyond

So the security measures you put in place should seek to ensure that:

Data protection for commissioners

Big Data for Mutuals. Marc Dautlich 25 November 2013

Information Security Risks when going cloud. How to deal with data security: an EU perspective.

Guidance on data security breach management

Merthyr Tydfil County Borough Council. Data Protection Policy

Data and Cyber Laws Up-date 9 July 2015

005ASubmission to the Serious Data Breach Notification Consultation

Auditing data protection a guide to ICO data protection audits

Proposed guidance for firms outsourcing to the cloud and other third-party IT services

Data Protection Policy

<Choose> Addendum Windows Azure Data Processing Agreement Amendment ID M129

Policy and Procedure for approving, monitoring and reviewing personal data processing agreements

technical factsheet 176

Office 365 Data Processing Agreement with Model Clauses

CERTIFICATE IN DATA PROTECTION DATA SECURITY & DATA PROTECTION. Presented by Sophie More O Ferrall 9 February 2015

COMMISSION REGULATION (EU) No /.. of XXX

Corporate Policy and Strategy Committee

Protection. Code of Practice. of Personal Data RPC001147_EN_WB_L_1

Corporate ICT & Data Management. Data Protection Policy

Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom

Corporate Information Security Policy

Data Protection in Ireland

Information Security Policy

Data protection policy

Data Protection and Information Security. Procedure for reporting a breach of data security. April 2013

A practical guide to IT security

Data Protection Breach Management Policy

ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY

NIGB. Information Governance Untoward Incident Reporting and Management Advice for Local Authorities

TERMS & CONDITIONS of SERVICE for MSKnote. Refers to MSKnote Limited. Refers to you or your organisation

Protection. Code of Practice. of Personal Data RPC001147_EN_D_19

Data Protection Policy

MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY

Data Protection Policy

Data controllers and data processors: what the difference is and what the governance implications are

This Amendment consists of two parts. This is part 1 of 2 and must be accompanied by and signed with part 2 of 2 (Annex 1) to be valid.

IM&T Infrastructure Security Policy. Document author Assured by Review cycle. 1. Introduction Policy Statement Purpose...

DATA PROTECTION POLICY

Once more unto the breach... Dealing with Personal Data Security Breaches. Helen Williamson Information Governance Officer

BRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS

DATA PROTECTION POLICY

Data Breach Notifications. Submission by the Australian Communications Consumer Action Network to the Attorney General s Department

How To Protect School Data From Harm

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

DATA PROTECTION POLICY

Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 EES

Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10

Summary of the Dutch Data Protection Authority s guidelines for the Data Breach Notification Act

Information Governance Strategy Includes Information risk & incident management methodology

Guidelines on Data Protection. Draft. Version 3.1. Published by

Information Circular

INFORMATION GOVERNANCE HANDBOOK

Data Protection Policy

The supplier shall have appropriate policies and procedures in place to ensure compliance with

Best Practices in Incident Response. SF ISACA April 1 st Kieran Norton, Senior Manager Deloitte & Touch LLP

DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

Guidance on data security breach management

Data Protection Act. Conducting privacy impact assessments code of practice

INFORMATION GOVERNANCE STRATEGIC VISION, POLICY AND FRAMEWORK

Draft Communications Data Bill

Data Processing Agreement for Oracle Cloud Services

Data Protection Act Bring your own device (BYOD)

Public Consultation regarding Data Sharing and Governance Bill. Contribution of Office of the Data Protection Commissioner

Data Protection Policy June 2014

ICO SME data protection workshop 25 September, NEC

Portable Devices and Removable Media Acceptable Use Policy v1.0

Transcription:

Security breaches: A regulatory overview Jonathan Bamford Head of Strategic Liaison

Security breaches and the DPA Data controllers security obligation - principle 7 of the DPA o Appropriate technical and organisation measures o Appropriate =nature of data, likely harm, technology and costs o Against unauthorised/unlawful processing of and accidental loss of/destruction to personal data Schedule 1, Part II interpretation of that principle: o Data processor selection, contracts and checks o Employee measures Breach = failure to meet that standard

Breach reporting under the DPA The law No mandatory breach reporting under the DPA, as currently enacted Some bodies (NHS, Central Government) have instituted their own requirements ICO approach Voluntary self reporting of breaches appropriate in some circumstances o Relevant factors? o See guidance on handling security breaches for more information Enforcement action where triggers in Regulatory Action Policy met

Breach reporting under the DPA ICO approach cont. Notifying affected data subjects? o No strict legal obligation o Assess the possible effects of the breach Website resources: o Guidance on security breach management o Security breach notification form o Guidance on security requirements o Recent blog on encryption and security lessons learned After a breach? Review the circumstances of the breach Assess any ongoing risk Identify and implement any changes required Cascade any internal messages

A personal data breach under the PECR Regulation 5A of the amended PECR 2003 Defined as: A breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data transmitted, stored or otherwise protected in connection with the provision of a public electronic communications service Obligation applies to service providers only

Reporting personal data breaches under the PECR Service provider: provider of public communications services see s.151 of the Communications Act 2003 What the law requires Service providers must: initially notify the ICO of any personal data breach within 24 hours provide any additional information in three days notify individuals of breaches that may adversely affect them without undue delay keep a log of any breaches Guidance published on our website with full details.

Personal data breach reporting under the PECR : the detail Secure electronic means provided via ICO website for breach reporting What must be reported: o To the ICO? o To adversely affected individuals? Consequences of failure to comply with reporting obligation: o 1,000 MPN for failure to report o Potential for enforcement action in respect of any other issues identified in course of investigation

Personal data breach log keeping under the PECR: the detail Regulation 5A(8) of the PECR requires service providers to keep a log of all data security breaches comprising: o the facts surrounding the breach o the effects of the breach o remedial action taken Many service providers have been doing this since 2011 Template log available on the PECR pages of our website Log to be provided monthly to the ICO even where no breaches reported ( nil return ) The dual reporting issue RIPA code and IOCCO

ICO Enforcement options Prosecutions for unlawful obtaining/disclosure etc Enforcement Notices Undertakings Assessment Notices (audits) Impose a civil monetary penalty of up to 500k

Security breaches: examples of penalties Kent Police 100K British Pregnancy Advisory Service 200K Ministry of Justice 140K Kwik Fix Plumbers 90k Parklife Festival 70k Bank of Scotland 75K Sony Computer Entertainment 250K

ICO published figures per quarter

Lessons learned Theft/loss of portable media reduced but still significant Retention/lack of weeding a problem Too many repeated incidents Poor communications/training/awareness a frequent factor Policies/procedures not related to jobs Security must be updated

Lessons learned Professional staff think they are immune Need to monitor contractors/processors Focus on IT security at expense of physical security Security improvements do not have to be expensive Movers and leavers procedures lacking/not implemented Room for improvement in governance

More ICO advice on security

Eight common failings 1. Not keeping software security up to date 2. SQL injection 3. Running unnecessary services 4. Poor decommissioning 5. Insecure storage of passwords 6. Failure to encrypt online communications 7. Processing data in inappropriate areas 8. Default credentials including passwords

Proposed EU regulation raises the bar

The future of breach reporting? Emphasis on compliance processes, paperwork and delegated legislation Draft regulation includes: o Reporting to ICO within 24 hours o Data processor required to report breaches immediately to data controller o Detailed specification of breach notification information o Obligation to notify individuals where possible adverse effect o Penalties of up to 1m or 2% worldwide turnover

ICO approach to proposals ICO views? Support risk-based breach notification: o to ICO o to data subjects (potentially adversely affected) Support other measures to improve risk management, subject to appropriate thresholds and flexibility: o PIAs and PbyD Minimisation of delegated legislation Harmonisation between DPA and PECR breach notification obligations

Preparing for security breaches Have clear procedures in place and policies to review them Define responsibilities: For reviewing procedures For reporting breaches Senior accountability for compliance Training of staff, availability of appropriate materials Records management particularly retention and data minimisation The role of PIAs and PbyD ICO resources Cyber insurance?

Keep in touch Subscribe to our e-newsletter at www.ico.org.uk or find us on /iconews @iconews