Process for Responding to Privacy Breaches



Similar documents
Key Steps for Organizations in Responding to Privacy Breaches

Key Steps to Responding to Privacy Breaches. Nova Scotia Freedom of Information and Protection of Privacy Review Office

Personal Data Security Breach Management Policy

Data Protection Act Data security breach management

Privacy Breach and Complaint Protocol

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM

Privacy and Security Training Policy (PS.Pol.051)

nbn is committed to identifying hazards, preventing workplace accidents and minimising dangerous health safety and environment incidents.

Workers Disability Compensation Claims Procedures Issued: January 1, 1994 Revised: March 29, 2012

DisplayNote Technologies Limited Data Protection Policy July 2014

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments

FAYETTEVILLE STATE UNIVERSITY

Accident Investigation

VCU Payment Card Policy

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy.

Information Security Policy

How To Ensure Your Health Care Is Safe

Heythrop College Disciplinary Procedure for Support Staff

WHAT YOU NEED TO KNOW ABOUT. Protecting your Privacy

Malpractice and Maladministration Policy

Public consultation paper

Data Protection Policy & Procedure

DATA REQUEST GUIDELINES

Project Open Hand Atlanta. Health Insurance Portability and Accountability Act (HIPAA) NOTICE OF PRIVACY PRACTICES

WORKPLACE INJURY/ILLNESS/INCIDENT INVESTIGATION & REPORTING POLICY (BC VERSION)

Kentwood Police Department 4742 Walma Ave SE Kentwood, Michigan (616) REPORTING IDENTITY THEFT

Texas Woman's University University Policy Manual

Information Security Incident Response Plan

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014

CROPREDY SURGERY Dr J Wright & Dr B Tucker

Preventing Identity Theft

General Records Authority 33. Accredited Training

How To Deal With A Data Breach In The European Law

Multi-Year Accessibility Policy and Plan for NSF Canada and NSF International Strategic Registrations Canada Company,

UNIVERSITY OF CALIFORNIA MERCED PERFORMANCE MANAGEMENT GUIDELINES

NYU Langone Medical Center NYU Hospitals Center NYU School of Medicine

REQUEST FOR PROPOSAL SECURITY SERVICES

GUIDELINE INFORMATION MANAGEMENT (IM) PROGRAM PLAN

FORM ADV (Paper Version) UNIFORM APPLICATION FOR INVESTMENT ADVISER REGISTRATION AND REPORT FORM BY EXEMPT REPORTING ADVISERS

State Fleet Card Oversight Usage and Responsibilities

Internet and Policy User s Guide

Frequently Asked Questions About I-9 Compliance

Systems Support - Extended

If I am arrested, does this mean that I am considered guilty of a criminal offence?

Remote Working (Policy & Procedure)

Creating an Ethical Culture and Protecting Your Bottom Line:

Scotiabank Group Privacy Agreement

Workers Compensation Employee Packet

POLICIES AND PROCEDURES

Hampton Roads Orthopaedics & Sports Medicine. Notice of Privacy Practices

Draft for consultation

NSW FAIR TRADING. Real Estate Fraud Prevention Guidelines

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer

Plus500CY Ltd. Statement on Privacy and Cookie Policy

Chapter 7 Business Continuity and Risk Management

APPLICATION FORM FOR DIGITAL TACHOGRAPH DRIVER CARD

OUR DISCIPLINARY POLICY

Insurance Toolkit for Landcare Groups in NSW P a g e 1

Maryland General Service (MGS) Area 29 Treatment Facilities Committee (TFC) TFC Instructions

FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT

BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS

Briefing 4 Inquests and the disclosure of information to the coroner

CONSTRUCTION INDUSTRIES & MANUFACTURED HOUSING DIVISION

Transportation Allowance Program

CHANGE MANAGEMENT STANDARD

There are a number of themed areas for which the Council has responsibility, and each of these is likely to generate debts of a specific type:

Interagency Guidance on Privacy Laws and Reporting Financial Abuse of Older Adults

FINANCIAL OPTIONS. 2. For non-insured patients, payment is due on the day of service.

THIRD PARTY PROCUREMENT PROCEDURES

HIPAA Notice of Privacy Practices. Central Ohio Surgical Associates, Inc.

GUIDANCE FOR BUSINESS ASSOCIATES

Internet and Social Media Solicitations: Wise Giving Tips

Identity fraud and theft

CSUSB Containment Guidelines CSUSB, Information Security Office

CORPORATE CREDIT CARD POLICY

Employees - recruitment, records and monitoring

First Global Data Corp.

Request for Resume (RFR) CATS II Master Contract. All Master Contract Provisions Apply

ensure that all users understand how mobile phones supplied by the council should and should not be used.

I. POLICY. their individual assets.

TrustED Briefing Series:

To clarify terms used within these policies, the following definitions are provided:

Accessible Service Policy

CMS Eligibility Requirements Checklist for MSSP ACO Participation

ERISA Compliance FAQs: Fiduciary Responsibilities

ES PROCEDURES FOR OVERPAYMENT RECOVERY

Chris Chiron, Interim Senior Director, Employee & Management Relations Jessica Moore, Senior Director, Classification & Compensation

CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT

Letter of Engagement. as instructed from time to time in respect of your/the company/trusts affairs

Serius Infrmatin Gvernance Incidents - OverVIEW

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK

3/2 MBA Application Instructions

Sources of Federal Government and Employee Information

KIK s GUIDE FOR LAW ENFORCEMENT

expertise hp services valupack consulting description security review service for Linux

Columbine Federal Credit Union ONLINE BANKING/ BILL PAYMENT AGREEMENT & DISCLOSURES AND PRIV ACY DISCLOSURE

A.M. BEST RATING SERVICES, INC. RATING DIVISION INTERNAL POLICY AND PROCEDURE. Subject: Dissemination Number: CRPC Policy 5

All Harvard University schools, tubs, local units, Affiliate Institutions, Allied Institutions and University-wide Initiatives.

Transcription:

Prcess fr Respnding t Privacy Breaches 1. Purpse 1.1 This dcument sets ut the steps that ministries must fllw when respnding t a privacy breach. It must be read in cnjunctin with the Infrmatin Incident Management Prcess, which says: 1. The Gvernment Chief Infrmatin Officer is respnsible fr the crdinatin, investigatin, and reslutin f infrmatin incidents. 2. All actual r suspected infrmatin incidents must be reprted immediately t yur supervisr and t the Gvernment Chief Infrmatin Officer, using the Infrmatin Incident Management Prcess. 3. The Gvernment Chief Infrmatin Officer is slely respnsible fr liaising with the Office f the Infrmatin and Privacy Cmmissiner regarding an actual r suspected privacy breach. If there is incnsistency between the Infrmatin Incident Management Prcess and this dcument, the Infrmatin Incident Management Prcess prevails. 2. What is a Privacy Breach and What is an Infrmatin Incident? 2.1 A privacy breach is a cllectin, use, disclsure, access, dispsal, r strage f persnal infrmatin, whether accidental r deliberate, that is nt authrized by the Freedm f Infrmatin and Prtectin f Privacy Act. A privacy breach is a type f infrmatin incident. Infrmatin incidents ccur when unwanted r unexpected events that threaten privacy r infrmatin security. They can be accidental r deliberate and include the theft, lss, alteratin r destructin f infrmatin. Other definitins can be fund in the Infrmatin Incident Management Prcess. 3. Prcess 3.1 All knwn r suspected privacy breaches require immediate remedial actin, n matter the sensitivity f the persnal infrmatin. Given the varied nature f privacy breaches, n ne-size-fits-all respnse is pssible, and actins are prprtinal and apprpriate t each privacy breach. 3.2 The fllwing steps are used t address privacy breaches. As the circumstances fr each privacy breach vary, these steps might ccur cncurrently r in quick successin; they d nt necessarily need t fllw the rder given belw: A. Reprt Immediately Emplyees, service prviders r thers must reprt suspected r actual privacy breaches immediately t their supervisr. The supervisr and/r emplyee, r ther persn als reprts immediately t the Office f the Gvernment Chief Infrmatin Officer (OCIO)by:

Calling the Shared Services BC Service Desk at 250 387-7000 r tll-free at 1-866 660-0811 (available 24 hurs a day); and Selecting Optin 3 and requesting an Infrmatin Incident Investigatin. Service prviders must reprt t their Gvernment cntract manager, wh in turn must reprt t the Office f the Gvernment Chief Infrmatin Officer as abve. In all cases, the persn wh identifies a breach must make the call themselves if they are nt able t reach a supervisr r ther designated individual immediately. This will invke the Infrmatin Incident Management Prcess. Privacy breaches must als be reprted t the Ministry Chief Infrmatin Officer. B. Cntain the Privacy Breach Emplyees, business wners (including supervisrs and service prviders) r thers shuld take immediate actin t cntain the privacy breach and t limit its impact. Apprpriate actins will depend n the nature f the breach and may include: Islating r suspending the activity that led t the privacy breach; Crrecting all weaknesses in physical security; Taking immediate steps t recver the persnal infrmatin, recrds r equipment frm all surces, where pssible; Determining if any cpies have been made f persnal infrmatin that was breached, and recvering where pssible. Nte: Where the privacy breach invlves infrmatin technlgy, the directin f the Investigatins Unit must be sught befre taking any cntainment steps. C. Assess the Extent and Impact f the Privacy Breach As part f the Infrmatin Incident Management Prcess, business wners (including supervisrs and service prviders) r thers will wrk with the OCIO Investigatins Unit, Incident Respnse Lead, r thers t determine the: (i) Persnal Infrmatin Invlved What persnal infrmatin has been breached? Is the persnal infrmatin sensitive? Examples are health infrmatin, scial wrker case histries, scial insurance numbers, financial infrmatin r infrmatin that can be used fr identity theft. A cmbinatin f persnal infrmatin is typically mre sensitive than a single piece f persnal infrmatin. (ii) Cause and Extent f the Breach What was the cause f the breach? What prgrams and systems are invlved? Is the persnal infrmatin encrypted r therwise nt readily accessible? Has the persnal infrmatin been recvered? What steps have already been taken t minimize the harm? Is this a ne-time ccurrence r an nging prblem?

(iii) Individuals Affected by the Breach Wh is affected by the breach? Fr example, emplyees, public, cntractrs, clients, service prviders, ther rganizatins. Hw many individuals are, r are estimated t be, affected by the breach? (iv) Freseeable Harm frm the Breach What pssible use is there fr the persnal infrmatin? Can the infrmatin be used fr explitatin, fraud r ther harmful purpses? Wh is in receipt f the persnal infrmatin? Fr example, a stranger wh accidentally receives persnal infrmatin and vluntarily reprts the mistake is less likely t misuse the infrmatin than an individual suspected f criminal activity. Is there a relatinship between the unauthrized recipient(s) and the data subject(s)? A clse relatinship between the tw might affect the likelihd f harm. Is there a risk f significant harm t the individual as a result f the breach? Fr example: security risk (e.g., physical safety) identity theft r fraud access t assets r financial lss lss f business r emplyment pprtunities breach f cntractual bligatins hurt, humiliatin, embarrassment, damage t reputatin r relatinships Is there a risk f significant harm t the public bdy r rganizatin as a result f the breach? Fr example: lss f public trust in the public bdy lss f assets financial expsure lss f cntracts r business risk t public health risk t public safety D. Dcument the Privacy Breach and Crrective Actin Taken As part f the Infrmatin Incident Management Prcess, business wners (including supervisrs and service prviders) r thers will wrk with the OCIO Investigatins Unit, Incident Respnse Lead, r thers t: 1) ensure that evidence f the privacy breach is preserved; and 2) dcument the privacy breach in detail, including: what happened and when; hw and when the privacy breach was discvered; the persnal infrmatin invlved and scpe f the breach; wh was invlved, if knwn; individuals interviewed abut the breach; whether privacy the breach has been cntained and any lst persnal infrmatin retrieved; wh has been ntified; the crrective actin taken, including any steps t assist affected individuals in mitigating harm (fr example, prviding credit watch services if apprpriate); and recmmendatins, including crrective actin that still needs t be taken.

E. Cnsider Ntifying Affected Individuals The impact f privacy breaches must be reviewed t determine if it is apprpriate t ntify individuals whse persnal infrmatin has been affected by the breach. As part f the Infrmatin Incident Management Prcess, the Incident Respnse Lead will wrk with the affected ministry s the ministry can ntify affected parties and take ther required actins, as apprpriate. (i) Ntifying affected individuals The key cnsideratin in deciding whether t ntify an affected individual is whether it is necessary t avid r mitigate harm t an individual, such as: A risk f identity theft r fraud (usually because f the type f infrmatin that has been cmprmised such as SIN, banking infrmatin, identificatin numbers); A risk f physical harm (fr example, if the cmprmised infrmatin puts an individual at risk f stalking r harassment); A risk f hurt, humiliatin r damage t reputatin (fr example, when the cmprmised infrmatin includes medical r disciplinary recrds, criminal histries r family case files); r A risk t business r emplyment pprtunities. Other cnsideratins in determining whether t ntify individuals include: Legislative requirements fr ntificatin; Cntractual bligatins requiring ntificatin; A risk f lss f cnfidence in the public bdy and/r gd custmer/client relatins dictates that ntificatin is apprpriate. (ii) When and hw t ntify If it is determined that ntificatin f individuals is apprpriate: When: Ntificatin shuld ccur as sn as pssible fllwing the breach. (Hwever, if law enfrcement authrities have been cntacted, it may be apprpriate t wrk with thse authrities in rder nt t impede their investigatin.) Hw: Affected individuals shuld be ntified directly by phne, email, letter r in persn whenever pssible. Indirect ntificatin using general, nn-persnal infrmatin shuld generally nly ccur when direct ntificatin culd cause further harm, is prhibitive in cst, r cntact infrmatin is lacking. Using multiple methds f ntificatin website publicatin, psted ntices, media in certain cases may be the mst effective apprach. (iii) What shuld be Included in the ntificatin Ntificatins shuld include the fllwing infrmatin, as apprpriate: Date f the breach. Descriptin f the breach (extent). Descriptin f the infrmatin cmprmised. Risk(s) t individual caused by the breach. Steps taken t mitigate the breach and any harms. Next steps planned and any lng-term plans t prevent future breaches. Steps the individual can take t further mitigate the harm, r steps the public bdy has taken t assist the individual in mitigating harm. Fr example, hw t cntact credit reprting agencies t set up a credit watch, r infrmatin explaining hw t change a persnal health number r driver s licence.

Cntact infrmatin f an individual within the public bdy r rganizatin wh can answer questins r prvide further infrmatin. The right t cmplain t the Office f the Infrmatin and Privacy Cmmissiner and the necessary cntact infrmatin. If the public bdy has already cntacted the Cmmissiner s ffice, include this detail in the ntificatin letter. Ntificatins shuld nt include the fllwing infrmatin: Persnal infrmatin abut thers r any infrmatin that culd result in a further privacy breach. Infrmatin that culd be used t circumvent security measures. Infrmatin that culd prmpt a misuse f the stlen infrmatin (fr example, if hardware was stlen fr simple 'wiping and resale', but the breach ntificatin prmpts smene t realize that persnal infrmatin is n the hardware and culd be f sme value if accessed). F. Infrm Other Parties as Apprpriate As part f the Infrmatin Incident Management Prcess, the Incident Respnse Lead will wrk with the affected ministry s the ministry can ntify affected parties and take ther required actins, as apprpriate. Affected parties may include, fr example: insurers, prfessinal r ther regulatry bdies, third-party cntractrs, internal business units, r unins. The Gvernment Chief Infrmatin Officer is slely respnsible fr liaising with the Office f the Infrmatin and Privacy Cmmissiner regarding an actual r suspected privacy breach. The fllwing factrs are relevant in determining whether t reprt a privacy breach t the Office f the Infrmatin and Privacy Cmmissiner: The sensitivity f the persnal infrmatin Whether the breached infrmatin culd result in identity theft r ther harm, including pain and suffering r lss f reputatin A large number f peple are affected by the breach The infrmatin has nt been fully recvered The breach is the result f a systemic prblem r a similar breach has ccurred befre G. Prevent Future Privacy Breaches Business wners (including supervisrs and service prviders) r thers will wrk with the OCIO Investigatins Unit, Incident Respnse Lead, r thers t investigate and manage the privacy breach. Gvernment, the ministry, r the ministry business wner will, as applicable, implement recmmendatins in accrdance with the Infrmatin Incident Management Prcess.