Data Breach Incidence Response Plan and Notification

Data Breach Incidence Response Plan and Notification

Data Breach Incidence Response Plan and Notification

A ‘data breach’ is not per se defined in the Protection of Personal Information Act 4 of 2013 (POPIA), but generally refers to the access or acquisition of personal information by an unauthorised person.

The financial impact of a data breach is unquestionably one of the most immediate consequences, but one should not disregard the reputable damage caused by such occurrence. Being prepared to respond and notify appropriately not only meets the regulatory requirement but also has the potential of limiting consequential damage, both reputational and financial.

What is the purpose of a data breach incidence response plan?

A comprehensive incidence response plan not only aids in minimising the damage caused by a data breach but also guides the organisation to recover in the shortest possible time.  There is no legal requirement to have such document on hand but it is invaluable in times of crisis as it ensures that nothing is overlooked.

A data breach incidence response plan typically includes some or all of the following depending on various organisational/industry factors:

  • Possible risks/scenarios related to data breaches;
  • Categories of importance attached to each possible risk/scenario;
  • Activities in response to a compromise;
  • List of people throughout the organisation who should be involved in the event of a breach, and their respective tasks;
  • Schedules for backups and archiving;
  • Third parties to assist in managing an incident, such as your legal team or insurance; and
  • Notification procedures.

Data breach notification

POPIA places an obligation on a responsible party (a person who determines the purpose and means of processing personal information – typically, but not always, the collector of information) to notify the Information Regulator and the data subject (owner of data) of a security compromise where there are reasonable grounds to believe that the personal information of a data subject had been accessed or acquired by any unauthorised person, unless the identity of such data subject cannot be established.

What is the process to notify the Information Regulator and data subjects of a data breach as per section 22 of POPIA

Step 1: Provide sufficient information in the notification that allows the data subject to take protective measures against the potential consequences of the data breach.

The notification must, at the very least, contain the following information:

  • A description of the possible consequences of the security compromise;
  • A description of the measures taken or proposed to be taken by the responsible party to remedy the security breach;
  • A recommendation of the measures that any party whose personal information was leaked should take in order to mitigate the possible adverse effects of the security compromise;
  • The identity of the unauthorised person who accessed or acquired the personal information, if known.

Step 2: Decide on the method in which to convey the written notification.

The following methods are permitted by section 22:

  • Postal delivery to the data subject’s last known physical or postal address;
  • Sent by e-mail to the data subject’s last known e-mail address;
  • Posted in a prominent place on the website of the responsible party;
  • Published in the news media; or
  • As may be directed by the Regulator.

The Information Regulator may be contacted at: inforeg@justice.gov.za.

In conclusion

Other than the legal requirement to notify the Information Regulator and data subjects of such incidence, there may also be contractual obligations with various third parties to meet. The incidence response plan integrates all the legal, contractual and organisational obligations and procedures to ensure an efficient recovery.

Although we are approaching the POPIA compliance deadline (1 July 2021), the threat of damages or even the possibility of a fine should not be the driving force for compliance but rather the end goal of having a country which enforces and empowers each person’s right to privacy.

Whilst the main focus of POPI is on compliance, our approach at SERR Synergy is to implement information compliance in such a way that it provides business value to our clients and allows for improvement in efficiencies and effectiveness by meeting the compliance requirements.

About the Author: Monique van der Merwe completed her B.Consumer Science degree at the University of Pretoria. She joined our team in July 2018 and currently holds the title of “Information Compliance Advisor”. She specialises in compliance with the Consumer Protection Act (CPA) as well as POPI and PAIA. This includes compiling legal compliance reports and developing policies along with the other assessment aspects relating to consumer protection legislation. She drafts and submits PAIA manuals to the Human Rights Commission and also compiles and implements Data and Information Protection Reports to identify risks associated with information security in each department of an organisation.

Sources:

https://www.werksmans.com/legal-updates-and-opinions/data-breaches-in-south-africa-post-popiany-lessons-to-be-learned/

https://www.itweb.co.za/content/KzQenqjV54gqZd2r

https://www.gov.za/sites/default/files/gcis_document/201409/3706726-11act4of2013protectionofpersonalinforcorrect.pdf

 

You May Also Like

 
Embracing digital technologies: the key to thriving in today's changing markets
Exploring the importance of companies embracing digital technologies to adapt to changing markets and ensure success in the long run.
 
How will Whatsapp’s new privacy policy affect you?
WhatsApp's new policy regarding personal data and sharing thereof with Facebook has concerned many of its users.
 
Practical steps to comply with the POPI Act
South Africa’s Personal Information Act 4 of 2013 (POPI Act) commenced on 1 July 2020, giving businesses 1 year to comply.
COVID-19
Online Resource & News Portal
SAcoronavirus.co.za