Unless you have an unlimited budget, privacy incidents are a matter of WHEN, not IF.
Therefore, as a DPO, you need to prepare yourself (and anyone else who should be involved) for potential incidents, just as you prepare for natural disasters with earthquake drills.
In this article, we explore the intricacies of creating an effective privacy incident response plan and the key components it should include to help you before, during, and in the aftermath of an incident.
An effective plan should be:
Before we go any further, it's worth noting that you can't really build an effective response plan without a solid privacy management programme.
However, as this is a much larger topic and we’re not here to explore it (for that we suggest you start with one of our previously published articles: 7 proven tactics for a more successful privacy management program), let's move on and look at the key stages of your plan.
Consider these 3 questions when preparing your plan:
Establish a dedicated incident response team, along with procedures, templates, and checklists for responding to privacy incidents. You should also identify and retain external service providers, such as cyber security experts and forensic investigators, so they are readily available to provide support in the critical first hours after an incident.
Here are 3 tips to consider in order to ensure that everyone is properly prepared to respond.
Assessing risk and ensuring the right controls are in place is an important part of preventing security incidents, and it's a job that requires close collaboration between the Privacy and InfoSec teams.
On the one hand, by looking at the underlying security information for the associated assets, the Privacy team can better understand what the potential security risks are for each relevant processing activity and how well they are being managed.
On the other hand, by understanding the risk severity of each activity, the InfoSec team can better understand which assets are used in critical activities and prioritise the resources needed to protect them.
If you want to explore the idea further, we’ve covered it in this previous article: Privacy management & information security — two sides of the data protection coin
Regular auditing of existing controls against industry standards and best practices will help you identify any gaps or weaknesses and ensure that policies, procedures, and all required documentation are usable and up to date.
To improve efficiency, aim to create a central repository for risk and compliance information and implement a common audit plan for legal, security and privacy controls.
The response and recovery phase of a privacy incident plan is critical to minimising harm to affected individuals and restoring your organisation's potentially damaged reputation. Here are the key steps in this phase:
Timely and effective communication with relevant stakeholders is essential during and after a privacy incident. Along with regulators, this includes employees, customers, and the media.
If you are subject to the GDPR, data breaches must be reported to the supervisory authority within 72 hours of discovery.
According to the Regulation, “the notification [...] shall at least:
Tips:
A post-incident review should be conducted to identify areas for improvement and to ensure that lessons learned are incorporated into future planning and preparation efforts.
This review should examine the entire incident response process, from planning and preparation to response and recovery, in order to identify any gaps, weaknesses, and opportunities for improvement.
In order to ensure the efficacy of a privacy incident response plan, it is important to regularly review reports on key metrics such as:
These reports help to identify emerging risks and opportunities for improvement and can be instrumental in justifying privacy budgets and investments to decision-makers at the executive level.
As your organisation and the external environment change and evolve, it is essential that your incident response plan is regularly updated and tested to ensure it remains effective and usable.
And remember that incident management, like privacy management, is a team game. Everyone should be trained and ready to play their part.
—
Did you find this article helpful? Stay tuned for more by 📌 following our Social Media pages and/or 👉 subscribing to our Newsletter. We'll keep you up to date on topics such as Privacy Management, Information Security, and GDPR compliance.