Part 3: Responding to data breaches – four key steps (2024)

Last updated: 5 June 2024

Key points

  • Each data breach response needs to be tailored to the circ*mstances of the incident.
  • In general, a data breach response should follow four key steps: contain, assess, notify and review.

Overview

Data breaches can be caused or exacerbated by a variety of factors, involve different types of personal information, and give rise to a range of actual or potential harms to individuals and entities.

As such, there is no single way of responding to a data breach. Each breach will need to be dealt with on a case-by-case basis, with an understanding of the risks posed by a breach and the actions that would be most effective in reducing or removing these risks.

This diagram summarises the data breach response process. Generally, the actions taken following a data breach should include four key steps:

Step 1: Contain the data breach to prevent any further compromise of personal information.

Step 2: Assess the data breach by gathering the facts and evaluating the risks, including potential harm to affected individuals and, where possible, taking action to remediate any risk of harm.

Step 3: Notify individuals and the Commissioner if required. If the breach is an ‘eligible data breach’ under the NDB scheme, it may be mandatory for the entity to notify.

Step 4: Review the incident and consider what actions can be taken to prevent future breaches.

At any time, entities should take remedial action, where possible, to limit the impact of the breach on affected individuals. If remedial action is successful in preventing a likely risk of serious harm to individuals, the NDB scheme notification obligations may not apply.

In general, entities should:

  • take each data breach or suspected data breach seriously and move immediately to contain, assess and remediate the incident. Breaches that may initially seem immaterial may be significant when their full implications are assessed
  • undertake steps 1 (Contain), 2 (Assess), and 3 (Notify) either simultaneously or in quick succession. In some cases it may be appropriate to notify individuals immediately, before containment or assessment of the breach occurs
  • determine how to respond on a case-by-case basis. Depending on the breach, not all steps may be necessary, or some steps may be combined. In some cases, an entity may take additional steps that are specific to the nature of the breach.

Step 1: Contain

Once an entity has discovered or suspects that a data breach has occurred, it should immediately take action to limit the breach.

For example, stop the unauthorised practice, recover the records, or shut down the system that was breached. If it is not practical to shut down the system, or if it would result in loss of evidence, then revoke or change computer access privileges or address weaknesses in physical or electronic security.

Addressing the following questions may help you identify strategies to contain a data breach:

  • How did the data breach occur?
  • Is the personal information still being shared, disclosed, or lost without authorisation?
  • Who has access to the personal information?
  • What can be done to secure the information, or stop the unauthorised access or disclosure, and reduce the risk of harm to affected individuals?

At this point, an entity may suspect an eligible data breach under the NDB scheme has occurred, which would trigger assessment obligations. Or, the entity may believe the data breach is an eligible data breach, which requires them tonotifyindividuals as soon as practicable.

During this preliminary stage, be careful not to destroy evidence that may be valuable in identifying the cause of the breach, or that would enable the entity to address all risks posed to affected individuals or the entity.

Step 2: Assess

An assessment of the data breach can help an entity understand the risks posed by a data breach and how these risks can be addressed. It should be conducted as expeditiously as possible.

Gather and evaluate as much information about the data breach as possible. By creating a complete picture of the data breach, an entity can ensure they understand the risk of harm to affected individuals, and identify and take all appropriate steps to limit the impact of a data breach.

This assessment should also assist entities in deciding whether affected individuals must be notified.

In your assessment of a data breach, consider:

  • the type or types of personal information involved in the data breach
  • the circ*mstances of the data breach, including its cause and extent
  • the nature of the harm to affected individuals, and if this harm can be removed through remedial action.

All entities should consider whether remedial action can be taken to reduce any potential harm to individuals. This might also take place during Step 1: Contain, such as by recovering lost information before it is accessed.

Entities subject to the NDB scheme are required to conduct an assessment of ‘suspected’ eligible data breaches and take reasonable steps to complete this assessment within 30 days (see Assessing a Suspected Data Breach). Criteria for assessing a data breach, including the risk of harm and remedial action, is explored in Identifying Eligible Data Breaches .

Step 3: Notify

Notification can be an important mitigation strategy that has the potential to benefit both the entity and the individuals affected by a data breach. The challenge is to determine when notification is appropriate. Sometimes, notifying individuals can cause undue stress or harm. For example, notifying individuals about a data breach that poses very little or no risk of harm can cause unnecessary anxiety. It can also de-sensitise individuals so that they don’t take a notification seriously, even when there is a real risk of serious harm. Each incident needs to be considered on a case-by-case basis to determine whether breach notification is required.

Consider:

  • the obligations of the entity under the NDB scheme. Entities are required to notify individuals and the Commissioner about data breaches that are likely to result in serious harm. Part 4 of this guide provides further detail about the NDB scheme’s requirements
  • other circ*mstances in which individuals should be notified. For example, your entity may not have obligations under the NDB scheme, but have processes in place to notify affected individuals in certain circ*mstances
  • how notification should occur, including:
    • what information is provided in the notification
    • how the notification will be provided to individuals
    • who is responsible for notifying individuals and creating the notification.
  • who else other than affected individuals (and the Commissioner if the notification obligations of the NDB scheme apply) should be notified
  • where a law enforcement agency is investigating the breach, it may be appropriate to consult the investigating agency before making details of the breach public
  • whether the incident triggers reporting obligations to other entities.

Effective data breach response is about reducing or removing harm to affected individuals, while protecting the interests of your organisation or agency. Notification has the practical benefit of providing individuals with the opportunity to take steps to protect their personal information following a data breach, such as by changing account passwords or being alert to possible scams resulting from the breach. It is important that staff are capable of engaging with individuals who have been affected by a data breach with sensitivity and compassion, in order not to exacerbate or cause further harm. Notification can also help build trust in an entity, by demonstrating that privacy protection is taken seriously.

Step 4: Review

Once steps 1 to 3 have been completed, an entity should review and learn from the data breach incident to improve its personal information handling practices.

This might involve:

  • a security review including a root cause analysis of the data breach
  • a prevention plan to prevent similar incidents in future
  • audits to ensure the prevention plan is implemented
  • a review of policies and procedures and changes to reflect the lessons learned from the review
  • changes to employee selection and training practices
  • a review of service delivery partners that were involved in the breach.

In reviewing information management and data breach response, an entity can refer to the OAIC’s Guide to Securing Personal Information.[12]

When reviewing a data breach incident, it is important to use the lessons learned to strengthen the entity’s personal information security and handling practices, and to reduce the chance of reoccurrence. A data breach should be considered alongside any similar breaches that have occurred in the past, which could indicate a systemic issue with policies or procedures.

If any updates are made following a review, staff should be trained in any changes to relevant policies and procedures to ensure a quick response to a data breach.

Part 3: Responding to data breaches – four key steps (2024)

FAQs

What are the four key steps in responding to data breaches? ›

An effective data breach response generally follows a four-step process — contain, assess, notify, and review. This section outlines key considerations for each of these steps to assist entities in preparing an effective data breach response.

What are the four steps involved when a privacy breach occurs? ›

Each data breach response needs to be tailored to the circ*mstances of the incident. In general, a data breach response should follow four key steps: contain, assess, notify and review.

What are the 4 common causes of data breaches? ›

The 8 Most Common Causes of Data Breaches
  • Weak and stolen credentials.
  • Backdoor and application vulnerabilities.
  • Malware.
  • Social engineering.
  • Too many permissions.
  • Ransomware.
  • Improper configuration and exposure via APIs.
  • DNS attacks.
Apr 19, 2024

What are four steps to Minimise the risk of privacy breaches? ›

The last step includes longer-term solutions and prevention strategies.
  • Step one: Contain the breach. Take whatever steps possible to contain the breach and minimise any resulting damage. ...
  • Step two: Evaluate the associated risks. ...
  • Step three: Consider notifying affected individuals. ...
  • Step four: Prevent a repeat.

What are the four 4 key issues in data security? ›

In general, data security can be broken down into four main elements: Confidentiality, Integrity, Authenticity, and Availability. Though some, such as confidentiality and integrity, are often considered the most important, they are useless without an integrated approach spanning every core concept in data security.

What are the 4 incident response plans? ›

The NIST incident response lifecycle breaks incident response down into four main phases: Preparation; Detection and Analysis; Containment, Eradication, and Recovery; and Post-Event Activity.

What is a data breach response plan? ›

A data breach response plan is a framework that sets out the roles and responsibilities involved in managing a data breach. It also describes the steps an entity will take if a data breach occurs.

What are the four actions that companies should perform after a data breach? ›

Secure Your Operations
  • Move quickly to secure your systems and fix vulnerabilities that may have caused the breach. ...
  • Mobilize your breach response team right away to prevent additional data loss. ...
  • Assemble a team of experts to conduct a comprehensive breach response. ...
  • Stop additional data loss.

What are the three 3 kinds of data breach? ›

Read on, and we'll discuss the seven most common types and how they can affect your business.
  • Stolen Information. ...
  • Ransomware. ...
  • Password Guessing. ...
  • Recording Keystrokes. ...
  • Phishing. ...
  • Malware or Viruses. ...
  • Distributed Denial-of-Service (DDoS)

What are the four major threats in data security? ›

Main threats to data security
  • Malware. We've all seen the headlines; malware can bring operations to a grinding halt and compromise sensitive data. ...
  • Social Engineering. ...
  • Insider threats. ...
  • Shadow IT. ...
  • Supply chain attacks. ...
  • Third-party vulnerabilities. ...
  • Cloud security vulnerabilities.
Mar 4, 2024

What is the most common method of data breach? ›

Hacking attacks may well be the most common cause of a data breach but it is often a weak or lost password that is the vulnerability that is being exploited by the opportunist hacker.

What 4 actions should you take to protect against cyberattacks? ›

5 easy tips to protect yourself - today
  • Check if you've already been involved in a data breach. Visit haveibeenpwned.com and change those passwords for any accounts that it suggests may have been compromised.
  • Check the strength of your passwords. ...
  • Avoid these passwords. ...
  • Trust no one (on emails) ...
  • Secure your device.

How to respond to a data breach? ›

72 hours - how to respond to a personal data breach
  1. Step one: Don't panic. ...
  2. Step two: Start the timer. ...
  3. Step three: Find out what's happened. ...
  4. Step four: Try to contain the breach. ...
  5. Step five: Assess the risk. ...
  6. Step six: If necessary, act to protect those affected. ...
  7. Step seven: Submit your report (if needed)

What are the key steps for organizations in responding to privacy breaches? ›

Four key steps in responding to a privacy breach

There are four key steps to consider when responding to a breach or suspected breach: 1) breach containment and preliminary assessment; 2) evaluation of the risks associated with the breach; 3) notification; and 4) prevention.

What are the steps to manage a data breach? ›

72 hours - how to respond to a personal data breach
  1. Step one: Don't panic. ...
  2. Step two: Start the timer. ...
  3. Step three: Find out what's happened. ...
  4. Step four: Try to contain the breach. ...
  5. Step five: Assess the risk. ...
  6. Step six: If necessary, act to protect those affected. ...
  7. Step seven: Submit your report (if needed)

What are the four major steps in the information security management process? ›

TÜV SÜD is accredited to do information security related certifications and organisations can pursue the following steps to achieve Information Security certifications.
  • Step 1: Risk Detection. ...
  • Step 2: Identification of weaknesses. ...
  • Step 3: Identification of security threats. ...
  • Step 4: Threat assessment.

What are the four stages of a cybersecurity incident response plan Csirp )? ›

It includes four main stages: preparation, detection/analysis, containment/eradication, and recovery. NIST recommendations are also important to align your organization with U.S. government guidelines on cybersecurity.

Top Articles
Reserve Bank of India
What Your Credit Card Rental Car Coverage Doesn’t Include - NerdWallet
Noaa Charleston Wv
Federal Fusion 308 165 Grain Ballistics Chart
Wells Fargo Careers Log In
Trade Chart Dave Richard
Youtube Combe
Student Rating Of Teaching Umn
C-Date im Test 2023 – Kosten, Erfahrungen & Funktionsweise
Immediate Action Pathfinder
5808 W 110Th St Overland Park Ks 66211 Directions
David Turner Evangelist Net Worth
735 Reeds Avenue 737 & 739 Reeds Ave., Red Bluff, CA 96080 - MLS# 20240686 | CENTURY 21
104 Whiley Road Lancaster Ohio
Highland Park, Los Angeles, Neighborhood Guide
Georgia Vehicle Registration Fees Calculator
Craigslist Mt Pleasant Sc
Edicts Of The Prime Designate
White Pages Corpus Christi
BMW K1600GT (2017-on) Review | Speed, Specs & Prices
Reptile Expo Fayetteville Nc
Gas Buddy Prices Near Me Zip Code
How to Watch Every NFL Football Game on a Streaming Service
Utexas Iot Wifi
Manuela Qm Only
City Of Durham Recycling Schedule
Tire Plus Hunters Creek
Jackie Knust Wendel
Meet the Characters of Disney’s ‘Moana’
FAQ's - KidCheck
3 Ways to Format a Computer - wikiHow
Ipcam Telegram Group
Ff14 Laws Order
Wega Kit Filtros Fiat Cronos Argo 1.8 E-torq + Aceite 5w30 5l
Oreillys Federal And Evans
Space Marine 2 Error Code 4: Connection Lost [Solved]
Acadis Portal Missouri
Craigslist Boats Eugene Oregon
Dollar Tree's 1,000 store closure tells the perils of poor acquisitions
Aurora Il Back Pages
craigslist: modesto jobs, apartments, for sale, services, community, and events
Man Stuff Idaho
Vindy.com Obituaries
CrossFit 101
Kushfly Promo Code
Rick And Morty Soap2Day
Game Like Tales Of Androgyny
Billings City Landfill Hours
Parks And Rec Fantasy Football Names
Psalm 46 New International Version
Anthony Weary Obituary Erie Pa
Latest Posts
Article information

Author: Melvina Ondricka

Last Updated:

Views: 5860

Rating: 4.8 / 5 (48 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Melvina Ondricka

Birthday: 2000-12-23

Address: Suite 382 139 Shaniqua Locks, Paulaborough, UT 90498

Phone: +636383657021

Job: Dynamic Government Specialist

Hobby: Kite flying, Watching movies, Knitting, Model building, Reading, Wood carving, Paintball

Introduction: My name is Melvina Ondricka, I am a helpful, fancy, friendly, innocent, outstanding, courageous, thoughtful person who loves writing and wants to share my knowledge and understanding with you.