Data Protection Breach Reporting Procedure



Similar documents
Information Governance Management Framework

IP-PGN-14 Part of NTW(O)05 Incident Policy

INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER

Policy Document Control Page

Information Incident Management and Reporting Procedures

Information Incident Management and Reporting Procedures

Security Incident Policy

Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom

Procedure for Managing a Privacy Breach

INFORMATION GOVERNANCE AND DATA PROTECTION POLICY

NIGB. Information Governance Untoward Incident Reporting and Management Advice for Local Authorities

Security Incident Management Policy

DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE

Information security incident reporting procedure

INFORMATION SECURITY INCIDENT REPORTING POLICY

The potential legal consequences of a personal data breach

Information Governance Strategy

INFORMATION GOVERNANCE POLICY

NHS Waltham Forest Clinical Commissioning Group Information Governance Strategy

SECURITY INCIDENT REPORTING AND MANAGEMENT. Standard Operating Procedures

Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager

Guidance on data security breach management

Information Governance and Data Protection Policy

Standard Operating Procedure for the Management of Information Governance Serious Incidents Requiring Investigation (IG SIRI)

NHS DORSET CLINICAL COMMISSIONING GROUP GOVERNING BODY INFORMATION GOVERNANCE TOOLKIT REPORT

Information Security and Governance Policy

Document Control. Version Control. Sunbeam House Services Policy Document. Data Breach Management Policy. Effective Date: 01 October 2014

Information Security Incident Management Policy

Corporate Information Security Policy

Islington Security Incident Policy A council-wide information technology policy. Version July 2013

Information Governance Policy

Guidance on data security breach management

MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY

How To Ensure Network Security

Information Governance Framework

CONTRACTS REVIEW FOR INFORMATION GOVERNANCE COMPLIANCE PROCEDURE

DISASTER RECOVERY PLAN

Information Incident Management. and Reporting Policy

Data Protection Policy

INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK

Information Governance Strategy :

THE MORAY COUNCIL. Guidance on data security breach management DRAFT. Information Assurance Group. Evidence Element 9 appendix 31

Data Protection Breach Management Policy

INFORMATION GOVERNANCE POLICY

INFORMATION GOVERNANCE POLICY

Information Incident Management Policy

Policy: D9 Data Quality Policy

Privacy and Electronic Communications Regulations

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

Somerset County Council - Data Protection Policy - Final

Information Governance Serious Incident Requiring Investigation Policy and Procedure

DBC 999 Incident Reporting Procedure

NHS Information Risk Management

A Best Practice Guide

NETWORK SECURITY POLICY

HOW TO; Report a Serious Incident Requiring Investigation (SIRI) or a Significant Event (SEA) to the Surrey and Sussex Area Team

Information Governance Policy

DUUS Information Technology (IT) Incident Management Standard

Incident reporting procedure

JOB DESCRIPTION. Information Governance Manager

All CCG staff. This policy is due for review on the latest date shown above. After this date, policy and process documents may become invalid.

COMMERCIALISM INTEGRITY STEWARDSHIP. Security Breach and Weakness Policy & Guidance

Data Breach Management Policy and Procedures for Education and Training Boards

INFORMATION TECHNOLOGY SECURITY STANDARDS

Network Security Policy

Data Security Breach Management - A Guide

INFORMATION GOVERNANCE HANDBOOK

Information Governance Standards in Relation to Third Party Suppliers and Contractors

RHONDDA CYNON TAF COUNTY BOROUGH COUNCIL INFORMATION SECURITY INCIDENT MANAGEMENT POLICY Version 2.0.1

INFORMATION GOVERNANCE POLICY

Health and Safety Management Standards

Information Security Incident Management Policy and Procedure. CONTROL SHEET FOR Information Security Incident Management Policy

Information Governance Strategy. Version No 2.1

Checklist Guidance for Reporting, Managing and Investigating Information Governance and Cyber Security Serious Incidents Requiring Investigation

Information Governance Policy

INFORMATION GOVERNANCE POLICY

Information Security Incident Management Policy September 2013

South West Lincolnshire NHS Clinical Commissioning Group Business Continuity Policy

Data Security Breach Incident Management Policy

Policy: IG01. Information Governance Incident Reporting Policy. n/a. Date ratified: 16 th April 2014

Information Governance Strategy

Incident Reporting Procedure

Information Circular

Corporate Policy and Strategy Committee

RECORDS MANAGEMENT POLICY

Information Governance Strategy

Information Governance Policy

Information Governance Policy

Information Governance Strategy & Policy

NOT PROTECTIVELY MARKED BUSINESS CONTINUITY. Specialist Operations Contingency Planning Business Continuity Manager

Human Resources Policy documents. Data Protection Policy

Once more unto the breach... Dealing with Personal Data Security Breaches. Helen Williamson Information Governance Officer

DERBYSHIRE COUNTY COUNCIL BUSINESS CONTINUITY POLICY

AUDIT COMMITTEE 10 DECEMBER 2014

Information Governance Strategy Includes Information risk & incident management methodology

NHS Commissioning Board: Information governance policy

Policy Name. Completed

INFORMATION GOVERNANCE POLICY & FRAMEWORK

Checklist Guidance for Reporting, Managing and Investigating Information Governance Serious Incidents Requiring Investigation

Standard: Information Security Incident Management

Transcription:

Central Bedfordshire Council www.centralbedfordshire.gov.uk Data Protection Breach Reporting Procedure October 2015 Security Classification: Not Protected 1

Approval History Version No Approved by Approval Date Comments V1.0 Information Assurance (IAG) Group 20 Jan 15 New Policy V2.0 Information Assurance Group 18 Aug 15 Revision (incl addition of reporting proforma) Document Author/Owner Version Authors Role V1.0 Sean Dykes FOI & Privacy Specialist V2.0 Sean Dykes Maria Damigos FOI & Privacy Specialist Legal Officer Document Governance Next Review Date Aug 16 Publish to Web Intranet Only Circulation This framework is to be made available to all CBC staff and observed by all members of staff Information Classification NOT PROTECTED 2

Index Introduction 4 Incident Management 5 Outline Procedure for Incident Handling 8 Incident Review 9 Recommendations 10 Annex. Data Protection Breach Reporting Form 11 3

1. INTRODUCTION 1.1 Background 1.1.1 The NHS Information Governance Tool Kit which is being adopted by Central Bedfordshire Council (CBC) requires that CBC provides assurance that appropriate procedures are in place for the handling of security incidents involving Personal Data. The Information Governance Toolkit is a performance tool produced by the Department of Health. Its purpose is to enable organisations to measure their compliance against the law and central guidance and to see whether information is handled correctly and protected from unauthorised access, loss, damage and destruction. 1.2 Purpose 1.2.1 The purpose of an incident response is to ensure that: Data breach events are detected, reported, categorised and monitored consistently. Incidents are assessed and responded to appropriately. Action is taken to reduce the impact of disclosure Mitigation improvements are made is put in place to prevent recurrence Serious breaches can be reported to the Information Commissioner Lessons learnt are communicated to the organisation as appropriate and can work to prevent future incidents. 1.3 Intended Audience 1.3.1 The intended audience for this document is anyone involved in responding to security incidents 1.3.2 It is assumed that the readership has a good understanding of the key aspects of privacy legislation and best practice when managing such incidents. 1.4 Scope 1.4.1 This procedure applies to all staff, partners, shared services, suppliers, contractors, representatives and agents of the Council who process personal data for which CBC is either the data controller or has an interest in the personal data affected. 1.4.2 All staff have a role to play to ensure a safe and secure workplace. 1.5 Terminology 1.5.1 In line with International Organisation for Standardisation (ISO) directive on the use of terminology in standards and for the avoidance of doubt the following words have the specific meanings ascribed below when used in this document : 4

Shall or Must denote a mandatory requirement. Deviation from these shall constitute non conformance Shall Not or Must Not denotes something that is prohibited Should denotes a recommendation that is non mandatory Should Not denotes something that is not recommended May denotes something that is optional. 1.5.2 Definitions of the technical terms used in this document can be found in the glossary. 2. INCIDENT MANAGEMENT 2.1 Definition 2.1.1 A Data Protection breach is the result of an event or series of events where Personally Identifiable Information (PII) is exposed to unauthorised or inappropriate processing that results in it s security being compromised The extent of damage or potential damage caused will be determined by the volume, sensitivity and exposure of the PII. 2.1.2 Breach management is concerned with detecting, reporting and containing incidents with the intention of implementing further controls to prevent the recurrence of the event. 2.1.3 Examples of common incidents are listed below: Type Technical Physical Human Resources Example Data Corruption Malware Corrupt Code Hacking Unescorted visitors in secure areas Break-ins to sites Thefts from secure sites Theft from unsecured vehicles/premises Loss in transit/post Data Input errors Non-secure disposal of hardware or paperwork Unauthorised disclosures 5

Inappropriate sharing 2.1.4 The proforma at Annex A is to be used for the reporting of ALL suspected data protection breaches 2.2 Management Statement of Intent 2.2.1 CBC shall: Put measures in place to ensure that awareness of data protection will enable breaches to be reported more easily Issue guidance on how to report PII breaches for analysis, categorisation and response Provide resource to analyse reported PII breaches to identify those that are incidents requiring a structured response Assemble breach response teams with a defined responsibility assignment matrix, as required, to contain and recover from security incidents Ensure that its contemporaneous logs of incidents are kept Hold periodic post resolution lessons learned meetings to focus on trends and improvements to reduce the likelihood and impact of recurrence, as appropriate. 2.2.2 CBC recognises that in some instances PII breaches are beyond its reasonable control and the importance of being prepared for such eventualities. 2.2.3 CBC shall ensure that it reacts appropriately to any actual or suspected PII breaches occurring either within the Council and its systems or with data processors. 2.2.4 CBC recognises that a structured response to PII breaches has a number of clear benefits to it including: Improving overall PII security Reducing adverse business impacts Strengthening the PII breach prevention focus Strengthening prioritisation Strengthening evidence collection and custody arrangements Contributing to budget and resource justifications Improving updates to information governance risk assessment and risk management Providing PII security awareness and training material Providing input to PII security policy reviews via lessons learned. 6

2.3 Outline Process for incidents 2.3.1 Diagram below shows the flow of actions involved in a PII Breach Investigation LEARN 2.3.2 Discovery/Identify/Assess/Investigate - Breaches and weaknesses need to be reported at the earliest possible stage to the FOI & Privacy Specialist in the form of Annex A. Only in urgent circumstances, can incidents be reported in other ways. 2.3.3 Following notification, the FOI & Privacy Specialist will open an incident log and make an initial assessment of the breach s severity. Once that s known, the FOI & Privacy Specialist must make the Senior Information Risk Owner (SIRO) and Caldicott Guardian (CG) and Legal aware. HR will be informed if deemed applicable. NOTE If the breach involves Adult Social Care or Public Health then the Serious Incident Requiring Investigation online tool must be used to centrally report a breach. 2.3.4 The reporting tool should capture most of the information needed to establish the scope of a breach but there will be a need to obtain additional information about the event, the assets affected, determining the type of incident, its category and priority before putting together an incident response team to manage the incident. 2.3.5 This is achieved by interviewing the key personnel involved in the breach and their line managers and collecting as much information as possible to determine how the breach occurred, what actions have been taken, whether outside agencies are involved and whether the data subjects have been notified 2.3.6 Not all data protection breaches will result in formal action. Some will be false alarms or near miss events that do not cause immediate harm to individuals or the organisation. These should still be reported, as analysis of these will allow lessons to be learnt and continual improvement. 7

2.4 Reporting 2.4.1 The objective of any breach investigation is to identify what actions the organisation needs to take to first prevent a recurrence of the incident and second to determine whether the incident needs to be reported to the Information Commissioner s Office. The purpose of the report is to document the circumstances of the breach, what actions have been taken, what recommendations have been made and whether the disciplinary action process needs to be followed. 2.5 Lessons Learned 2.5.1 Key to preventing further incidents is ensuring the organisation learns from an incident. Regular review meetings will take place chaired by the SIRO to agree recommendations and each Breach Report will be shared with the Improvement & Corporate Services Director and the Monitoring Officer. These meetings will also be attended by key stakeholders across the Council to consider trends and identify opportunities for improvement 2.6 Review and Revision 2.6.1 This document will be reviewed as it is deemed appropriate, but no less frequently than every 12 months. 2.7 Key Message 2.7.1 A culture in which data protection breaches are reported should be fostered. Although sanctions cannot be totally ruled out, the key objective is develop valuable insight into how such events occur and staff need to be assured that reporting a breach will not in itself result in disciplinary action. 3. OUTLINE PROCEDURE FOR INCIDENT HANDLING 3.1 Investigation Once a breach has been reported in the form of Annex A the following actions must be carried out by the FOI & Privacy Specialist as soon as possible: Create an entry in the Council s Personal Data Incident Log using the information provided by the reporter Create a folder under Data Breaches using the following format PB[Breach Reference Number] Start an investigation report and save it in this folder together with any emails/documents relating to the breach. 3.2.1 If Adult Social Care information is affected, then the FOI & Privacy Specialist must complete the online SIRI tool as well but do not do so until the internal tool has been completed. See below for further information regarding the SIRI tool. 8

3.2.2 Inform the SIRO and Caldicott Guardian and prepare report for Breach Review Meeting if required. 3.2.3 If the SIRI tool indicates that a report to the ICO is required, contact the SIRO and Caldicott Guardian to seek approval for notification. An initial report for the ICO should also be prepared. The Monitoring Officer will also be notified. 3.2.4 Consideration must be given to notifying the individual(s) affected by the breach. Factors to consider include Sensitivity of Information Volume of information Likelihood of unauthorised use Impact on individual(s) Feasibility of contacting individuals 3.2.5 Any notification must be agreed by senior managers of reporting business unit and if required, legal services and communications. 3.2.6 Begin investigation and complete report as soon as possible 3.3 Completing the SIRI Tool (to be completed by the FOI & Privacy Specialist) 3.3.1 In partnership with the ICO, the Department of Health has developed the Serious Incident Requiring Investigation (SIRI) reporting tool. This has been designed so that any breaches of personal information affecting adult social care can be reported centrally and so that any breach that meets the minimum criteria for reporting to the ICO is automatically reported to them as well as, in some cases, the Department of Health as well. 3.3.2 The tool has been adapted for internal use and must be completed before any online submission. If the internal breach reporting form has been used then some or all the information you need will already be available. 3.3.3 Once details have been entered, the tool will generate a score from -3 upwards and depending on the overall score, the Council may have to report it to the ICO. FOI & Privacy Specialist will then contact both the SIRO & Caldicott Guardian to discuss next steps. 4 INCIDENT REVIEW 4.1 A key part of data protection breach management is a process of continual review. Every two to four weeks the SIRO, CG & FOI & Privacy Specialist meet to review current breaches. The purpose of these meetings is to provide an update on the progress of any investigation, discuss possible recommendations and consider whether specific incidents should be reported to the ICO. 9

4.2 In addition to these meetings, the Information Assurance Group (IAG) is held that includes the following individuals: SIRO CG FOI & Privacy Specialist 4.3 These meetings are used to review the outcome of any investigations, as appropriate, and examine the recommendations made and discuss information governance matters affecting the Authority. Invited to these meetings will also be the respective Directors and or Assistant Directors of departments across the Authority. Following on from these meetings, a monthly brief is given to CMT members giving an overview of current IG issues and breaches which are then escalated to the Chief Executive and Portfolio Holder if required. 5 RECOMMENDATIONS 5.1 Regardless of the type and severity of incident, there will always be recommendations to be made even if it is only to reinforce existing procedures. There are two categories of recommendation that can be made: Local these apply purely to the department(s) affected by the incident and will usually reflect measures that need to be taken to restrict the chances of the same type of incident occurring. Corporate some incidents will be caused by factors that are not unique to one department but can be found right across the organisation. Issues such as training, information handling and physical security affect all departments and it is essential that the organisation identifies such risks and puts in place measures to prevent the incident occurring elsewhere. Corporate recommendations may even be shared regionally especially where it relates to policies/protocols in use by a number of public bodies. 5.2 All recommendations will be assigned an owner and have a timescale by when they should be implemented which has a dual purpose. The first is to ensure that the organisation puts in place whatever measures have been identified and that there is an individual that can report back to CMT on progress. The second is that where incidents are reported to the ICO, the Council can demonstrate that the measures have either been put in place or that there is a documented plan to do so. 5.3 This is a recurrent theme of ICO enforcement and it s important that the organisation s procedures reflect this. Identifying recommendations is more than just damage control the knowledge of what has happened together with the impact is a fundamental part of learning which can then be disseminated throughout the organisation and beyond. 10

Annex A Data Protection Breach Reporting Form The aim of this document is to ensure that in the event of a security incident such as data loss, all information can be gathered to understand the impact of the incident and what must be done to reduce any risk to customers and/or CBC data and information and the individuals concerned. The checklist can be completed by anyone with knowledge of the incident. It will also require review by the FOI & Privacy Specialist who can determine Data Protection Act implications and assess whether changes are required to existing business processes. 1. Summary of Incident Date and Time of Incident Number of people whose data is affected Department Nature of breach e.g. theft/disclosed in error/technical problems Description of how breach occurred 11

2. Reporting When was breach reported? How you became aware of the breach: Has FOI & Privacy Specialist been informed (74968): 3. Personal Data Full description of personal data involved (without identifiers); Number of individuals affected: Have all affected individuals been informed: If not, state why not: Is there any evidence to date that the personal data involved in this incident has been inappropriately processed or further disclosed? If so, please provide details: 12

4. Data Retrieval What immediate remedial action was taken: Has the data been retrieved or deleted? If yes - date and time: 5. Impact Describe the risk of harm to the individual as a result of this incident: Describe the risk of identity fraud as a result of this incident: Have you received a formal complaint from any individual affected by this breach? If so, provide details: 6. Management Do you consider the employee(s) involved has breached information governances policies and procedures: Please inform of any disciplinary action taken in relation to the employee(s) involved: Had the employee(s) completed data protection training: As a result of this incident, do you consider whether any other personal data held may be exposed to similar vulnerabilities? If so, what steps have been 13

taken to address this: Has there been any media coverage of the incident? If so, please provide details What further action has been taken to minimise the possibility of a repeat of such an incident? Please provide copies of any internal correspondence regarding any changes in procedure: 14