GDPR Article 33 deals with an organisation’s obligation to notify the relevant legal or regulatory authority when the rights and freedoms of an individual has been put at risk, due to their actions (or a partnered third party’s actions) as a data controller.
Notification of a personal data breach to the supervisory authority
- In the case of a personal data breach, the controller shall without undue delay and, where feasible, not later than 72 hours after having become aware of it, notify the personal data breach to the supervisory authority competent in accordance with Article 55, unless the personal data breach is unlikely to result in a risk to the rights and freedoms of natural persons. Where the notification to the supervisory authority is not made within 72 hours, it shall be accompanied by reasons for the delay.
- The processor shall notify the controller without undue delay after becoming aware of a personal data breach.
- The notification referred to in paragraph 1 shall at least:
- Describe the nature of the personal data breach including where possible, the categories and approximate number of data subjects concerned and the categories and approximate number of personal data records concerned;
- Communicate the name and contact details of the data protection officer or other contact point where more information can be obtained;
- Describe the likely consequences of the personal data breach;
- Describe the measures taken or proposed to be taken by the controller to address the personal data breach, including, where appropriate, measures to mitigate its possible adverse effects.
- Where, and in so far as, it is not possible to provide the information at the same time, the information may be provided in phases without undue further delay.
- The controller shall document any personal data breaches, comprising the facts relating to the personal data breach, its effects and the remedial action taken. That documentation shall enable the supervisory authority to verify compliance with this Article.
Notification of a personal data breach to the Commissioner
- In the case of a personal data breach, the controller shall without undue delay and, where feasible, not later than 72 hours after having become aware of it, notify the personal data breach to the the Commissioner, unless the personal data breach is unlikely to result in a risk to the rights and freedoms of natural persons. Where the notification under this paragraph is not made within 72 hours, it shall be accompanied by reasons for the delay.
- The processor shall notify the controller without undue delay after becoming aware of a personal data breach.
- The notification referred to in paragraph 1 shall at least:
- Describe the nature of the personal data breach including where possible, the categories and approximate number of data subjects concerned and the categories and approximate number of personal data records concerned;
- Communicate the name and contact details of the data protection officer or other contact point where more information can be obtained;
- Describe the likely consequences of the personal data breach;
- Describe the measures taken or proposed to be taken by the controller to address the personal data breach, including, where appropriate, measures to mitigate its possible adverse effects.
- Where, and in so far as, it is not possible to provide the information at the same time, the information may be provided in phases without undue further delay.
- The controller shall document any personal data breaches, comprising the facts relating to the personal data breach, its effects and the remedial action taken. That documentation shall enable the Commissioner to verify compliance with this Article.
Book a 30 minute chat with us and we’ll show you how
As well as thoroughly documenting all events surrounding a breach, organisations need to consider six governing factors when acting upon a data breach:
When notifying the supervisory authority organisations need to:
In order to create a cohesive, highly functioning incident management policy that safeguards the availability and integrity of privacy information during critical incidents, organisations should:
Staff involved in privacy information security incidents should understand:
When dealing with privacy information security events, staff should:
Reporting activities should be centred around 4 key areas:
Organisations should ensure that privacy information security incidents are dealt with by a dedicated technical team with the skills and resources to affect a prompt resolution (see ISO 27002 Control 5.24).
Organisations should:
GDPR Article | ISO 27701 Clause | ISO 27002 Controls |
---|---|---|
EU GDPR Articles 34 (1), 34 (2), 34 (3)(a), 34 (3)(b), 34 (3)(c) and 34 (4) | ISO 27701 6.13.1.1 | ISO 27002 5.25 ISO 27002 5.26 ISO 27002 5.5 ISO 27002 5.6 ISO 27002 6.8 ISO 27002 8.15 ISO 27002 8.16 |
EU GDPR Articles 34 (1) and 34 (2) | ISO 27701 6.13.1.5 | ISO 27002 5.24 ISO 27002 5.27 ISO 27002 5.28 ISO 27002 5.29 ISO 27002 5.30 |
A breach of GDPR can result in significant fines, making it one of the world’s toughest privacy and security regulations. As a result, it implies that organisations must protect personal data to a ‘reasonable’ extent.
But here’s the good news.
In a secure, always-on location, ISMS.online makes it easy for you to jump right into GDPR compliance and demonstrate a level of protection that extends beyond ‘reasonable’.
We make data mapping a simple task. By adding your organisation’s details to our preconfigured dynamic Records of Processing Activity tool, you can easily record and review it all.
If the worst happens, you’ll be ready.
With our tools, you can plan, communicate, document, and learn from every breach.
Find out more by booking a short 30 minute demo.
Book a tailored hands-on session
based on your needs and goals
Book your demo