This policy deals with actions to be taken in the event of a possible security breach either cyber or physical (e.g. a break-in at the office). You should refer to the Data Breach Action Plan on the following pages.
It is worth noting that not all security breaches are personal data breaches. The test is does the controller no longer control the personal data (i.e. can't ensure compliance with the data protection principles).
If there is uncertainty as to whether the test is met, investigations should be undertaken in accordance with the process below.
There are three types of breach and an incident may be more than one type. All are equally serious.
Unauthorised or accidental disclosure of or access to personal data.
Unauthorised or accidental alteration of personal data.
Accidental or unauthorised loss of access or destruction of personal data.
The following pages contain:
Aim: Protect individuals and their data
If there is concern that a breach may have occurred:
If no security incident: stand down.
Focus: Protection of individuals and their data
Continue to investigate breach. Documents and correspondence relating to potential breach to cc lawyer.
When investigating consider:
Information Commissioner's Office
Need to notify ICO within 72 hours of Zero Hour unless unlikely to result in a risk to rights and freedoms of individuals. So, if likely to risk rights and freedoms of people, then must notify.
Use the pro forma ICO Data Breach Notification — Annex 1
Notification may need to occur before the full extent of the breach is understood or other details are missing. It is acceptable to notify the ICO and include further areas that we will investigate and update.
Communication with Data Subjects
Need to notify data subjects (affected individuals) without undue delay if the breach is likely to result in a high risk to rights and freedoms of individuals.
But, do not need to notify if:
Pro forma data breach notification with affected individuals — Annex 2. In the event that we consider it disproportionate to contact the individuals, public communication may be used, but it must be equally effective to direct communication.
| To: | Information Commissioner |
| Phone: | 0303 123 1113 |
| From: | |
| Description of breach: | |
| Type of breach: | Confidentiality breach Integrity breach Availability breach |
| Likely cause of breach: | |
| Type of data lost: | |
| Potential number of data subjects: | |
| Potential number of data records affected: | |
| Likely Consequences | |
| Description of likely consequences of personal data breach | |
| Measures Taken | |
| Description of measures taken already or in place at time of breach | |
| Further Investigation and Follow-up | |
| Description of any further investigation required (if any) and approx time frame | |
| Description of any follow up action proposed and time frame | |
| To: | Data Subject |
| From: | |
| Description of breach: | |
| Type of breach: | Confidentiality breach Integrity breach Availability breach |
| Likely cause of breach: | |
| Type of data lost: | |
| Potential number of data subjects: | |
| Potential number of data records affected: | |
| Likely Consequences | |
| Description of likely consequences of personal data breach | |
| Measures Taken | |
| Description of measures taken already or in place at time of breach | |
| Further Investigation and Follow-up | |
| Description of any further investigation required (if any) and approx time frame | |
| Description of any follow up action proposed and time frame | |
Version 1.0 · November 2024
Data Breach Policy & Action Plan — Confidential
Typically replies within an hour
I will be back soon
👋 Hello and welcome to Notary Northampton!
We’re here to help with document witnessing, certification, statutory declarations, and more.