skip to Main Content
GDPR Data Breach

What to do when a data breach occurs:

  •  Record time and date.

  • Call and interview reporter.

  • Close the gap!

  • Qualification of the breach.

  • Follow the data breach protocol.

  • ​Report to authorities/data subjects (if needed).

You have 72 hours to execute these steps!
If in doubt, contact us.

 

A data breach is an incident that exposes confidential or protected information containing personal data. It involves all situations in which information is accessed without authorization.

It can lead to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to personal data. This means any personal data that is stored, processed or transmitted.

Data breaches can hurt your business and your customers in a variety of ways. They can be costly and can negatively influence lives and reputations.

It includes more than just losing personal data. Personal data breaches can include:

  • Access by an unauthorized third party.
  • Deliberate or accidental action by a controller or processor.
  • Sending personal data to an incorrect recipient (e.g. sent to the wrong email address).
  • Devices being lost or stolen that contained personal data (e.g. laptops and mobile phones).
  • Alteration of personal data without permission.

Under GDPR, obligations have been imposed for all businesses to report major types of personal data breaches to authorities. This must be done within 72 hours of the business becoming aware of the breach.

Authorities, media, labour organizations, customers and employees may ask you, later in the process, how you reacted to the data breach. In order to have a sound answer that is convincing, start recording all actions from the start. This begins with the time and date when you get notified about the data breach. It is also important evidence to prove that you met the mandatory 72 hours response time.

It is most important that you call the reporter of the breach. It is the best way to collect all important detailed information.

   Don’t lose valuable time.

   Don’t respond via email.

If the incident is indeed a data breach: close the gap first!
You probably will need help from your IT colleagues, so involve them from scratch.

To choose the right level of alarm, you have to determine what kind of personal data the incident regards.

The GDPR (Art. 4, 12-15) mentions 4 kinds:

  • personal data
  • genetic data
  • biometric data
  • data concerning health

Also the possible impact of the breach has to be determined.
An email with personal data send to the wrong person is a data breach, but not as alarming as an unprotected shared server with personal data that is exposed to the internet.

To be in control when a data breach occurs, a data breach protocol must be in place that is approved by legal, IT and the communication department, and authorized by senior management.

A data breach will not always cling to working hours, so your data breach protocol must contain the cellphone numbers of key persons that may be needed to close the gap.

Your data breach protocol must contain a checklist to make sure that all required steps will be followed and that you will not lose time or do not receive important information.

It’s important that all persons involved in securing the data breach have knowledge of this protocol. We even advise that all involved people will sign the data breach protocol for reading and understanding.

After you collected all required information and completed the checklist from your data breach protocol, you have to determine if you need to report the breach to the authorities and/or to the people whose personal data is involved (the data subjects).

Reporting to data subjects can be done by sending a mail to them individually, by releasing a public statement, like a press release or a statement on your website or by any other means. Whatever is appropriate for the impact of the data breach on them.

Reporting to authorities must be done to the authority of the country where the most involved subjects reside. It may be sensible to report to authorities in other countries as well.

For GDPR, it is mandatory for you to report a data breach when you  and your team judge that the incident is a data breach and can have a big impact on persons involved. The way how you report the data breach can have great consequences, both on your reputation, your business and the possible fines authorities impose on you.

Be clear and be honest, but use the right wording.

DATA BREACH FLOW

data breach flow

Resolving all effects of a data breach can take a serious amount of time.

  • Authorities may ask additional questions.
  • Media might start publishing about it.
  • IT might not be sure all gaps are covered at once.

Keep on monitoring activities on the data breach to make sure all aspects are handled properly until you are sure you are safe again. You might want to appoint a dedicated person to be in charge of this. A DPO or privacy officer is a natural candidate, if such a function exist in your company.

But of course, it might also be a small data breach with little impact on your company and the people involved. In that case, recording the data breach will be a small effort.

What’s next

If you have additional questions about a data breach, just reach out to us. We are here to help you, and will do it with pleasure.

If you have a data breach at hand and are not sure what to do: don’t hesitate to contact us immediately.

Please use our contact form if you have additional questions regarding data breaches.

Uitroepteken

Your first question is free of charge

Contact Form

    Pivot Park Oss

    Vivenics

    Visiting address:
    Pivot Park
    Kloosterstraat 9
    5349 AB Oss, The Netherlands

    Postal address:
    PO Box 228
    5340 AE Oss, The Netherlands

    Email: gdprteam@vivenics.com

    Office: +31 (0)88 8483 100

    Privacy
    Vivenics Privacy Policy