Breach Notification | Data Protection Commission (2024)

Report a breach

Summary of Breach Notification Form Changes

Overview of the upcoming new breach notification web-forms

As part of the rollout of the DPC’s new case management system an automated response will now immediately issue to any breach notifications submitted by data controllers. This automated reply will contain a DPC reference which should be quoted in full and unaltered in any reply to ensure that it is properly associated with the correct case file. The case reference provided by the DPC will appear different to the “BN” format previously used, the new case references are prefixed with DPC for example DPC0601123456, any controller side internal reference will not be included in the DPC automated reply so the DPC would recommend that you track any breach notification submissions which you make and match them to the automated reply which you will immediately receive.

From 25 May 2018, the General Data Protection Regulation (GDPR) introduces a requirement for organisations to report personal data breaches to the relevant supervisory authority, where the breach presents a risk to the affected individuals. Organisations must do this within 72 hours of becoming aware of the breach.

Where a breach is likely to result in a high risk to the affected individuals, organisations must also inform those individuals without undue delay.

Please see guidance below in relation to notifying this office of a breach. Please note the separate reporting requirements that are applicable to providers of publicly available electronic communications networks or services, under the European Communities (Electronic Communications Networks and Services) (Privacy and Electronic Communications) Regulations 2011 (SI 336 of 2011).

To facilitate decision-making and determine whether or not your organisation needs to notify the relevant supervisory authority and affected individuals, you should have a high-quality risk management process and robust breach detection, investigation and reporting processes.

Please note even where you determine there is no risk to affected individuals following a personal data breach, you need to keep an internal record of the details, the means for deciding there was no risk, who decided there was no risk, and the risk rating that was recorded.

Initial notification of a breach

  • Allbreach notifications must be notified using the 'Breach Notification Form'.
  • All cross-border personal data breaches must be indicated as being cross-border on the relevant section of theform.
    Cross-border processing means either:
    • Processing of personal data which takes place in the context of the activities of establishments in more than one Member State of an organisation; or
    • Processing of personal data which takes place in the context of the activities of a single establishment of an organisation that substantially affects or is likely to substantially affect data subjects in more than one Member State.
  • Note for providers of publicly available electronic communications networks or services: Because the European Communities (Electronic Communications Networks and Services) (Privacy and Electronic Communications) Regulations 2011 (SI 336 of 2011) place specific obligations on providers of publicly available electronic communications networks or services to safeguard the security of their services, to report a breach on behalf of any organisation in this sector, please complete our Telecoms/ISP providers Data Security Breach Notification Form.
  • In the subject line of the email please include the following information:
    • Whether the breach you wish to notify DPC of is 'new' or an 'update' to a previous breach notification;
    • Your organisation name; and
    • Your self-declared risk rating for the breach.

An example of an email subject line is provided below:
Subject: New Breach Report, [organisation name], High Risk

Self-Declared Risk Rating

In determining how serious you consider the breach to be for affected individuals, you should take into account the impact the breach could potentially have on individuals whose data has been exposed. In assessing this potential impact you should consider the nature of the breach, the cause of the breach, the type of data exposed, mitigating factors in place, and whether the personal data of vulnerable individuals has been exposed. The levels of risk are further defined below:

  • Low Risk: The breach is unlikely to have an impact on individuals, or the impact is likely to be minimal.
  • Medium Risk: The breach may have an impact on individuals, but the impact is unlikely to be substantial.
  • High Risk: The breach may have a considerable impact on affected individuals.
  • Severe Risk: The breach may have a critical, extensive or dangerous impact on affected individuals.

Updating an existing notification

  • If your notification was incomplete for any reason, you should submit further information when it becomes available. In this case, please submit a new version of the appropriate form with the relevant fields of the form completed.
  • For updated notifications please include the following information in the subject line of the email:
    • Updated Breach Notification;
    • Organisation Name; and
    • DPC reference number (if one has been provided).

An example of an email subject line is provided below:
Subject: Update Breach Report, [Organisation Name], [Reference Number], High Risk

Please do not include the personal information of affected individuals in your notification.

Further Information

Summary of Breach Notification Form Changes

Overview of the upcoming new breach notification web-forms

A quick Guide to GDPR Breach Notifications

A Practical Guide to Personal Data Breach Notifications under the GDPR

Data Breach Trends from the First Year of the GDPR

Breach Notification | Data Protection Commission (2024)

FAQs

Why did I get a data breach notification? ›

When a data breach occurs, the organization that was hacked will likely be required required by law to notify customers whose information was exposed. They do this in the form of a data breach notification letter.

What are the three minimum requirements for a notification in case of data breach? ›

The notification shall at least describe the nature of the breach, the sensitive personal information possibly involved, and the measures taken by the entity to address the breach.

What are the requirements for data breach notification? ›

Specifically, the Commission requires carriers to report, at a minimum, information relevant to the breach, including: carrier address and contact information; a description of the breach incident; the method of compromise; the date range of the incident; the approximate number of customers affected; an estimate of ...

Do I need a data breach response plan? ›

All entities should have a data breach response plan. A data breach response plan enables an entity to respond quickly to a data breach.

How do you know if a data breach letter is legitimate? ›

Real Letters Contain:
  • A 25 digit PIN to register for credit and identity monitoring services. Make sure your PIN is real by entering it at opm.gov/cybersecurity.
  • Instructions to visit the website opm.gov/cybersecurity to get more information and sign up for monitoring.

What are the three 3 kinds of data breach? ›

The most common types of data breaches are: Ransomware. Phishing. Malware.

What is the maximum fine you can receive if a data breach occurs? ›

For especially severe violations, listed in Art. 83(5) GDPR, the fine framework can be up to 20 million euros, or in the case of an undertaking, up to 4 % of their total global turnover of the preceding fiscal year, whichever is higher.

What actions must be taken if a data breach occurs? ›

Here are six steps to take if your information is exposed in a data breach.
  • Stay Alert. ...
  • Secure Your Accounts. ...
  • Initiate a Fraud Alert. ...
  • Monitor Your Financial Accounts and Credit Reports. ...
  • Freeze or Lock Your Credit File. ...
  • Stay Vigilant to Signs of Scams.
Apr 8, 2024

What should be the first step if a data breach is suspected? ›

Step 1: Contain

Once an entity has discovered or suspects that a data breach has occurred, it should immediately take action to limit the breach. For example, stop the unauthorised practice, recover the records, or shut down the system that was breached.

What is the data breach response and notification procedure? ›

You have a procedure to assess the likelihood and severity of the risk to individuals as a result of a personal data breach. You have a procedure to notify the ICO of a breach within 72 hours of becoming aware of it (even when all the information is not yet available) and you notify the ICO on time.

Which of the following is not included in a breach notification? ›

Explanation: In a breach notification, articles and other media reporting the breach are NOT included. A breach notification is a legally required communication that organizations must send to individuals in the event of a data breach or unauthorized acquisition of personal information.

Can you get in trouble for a data breach? ›

As breaching section 170(1) is a criminal offence, your employer or the individuals whose data have been breached may report you to the police. This could lead to you being charged and prosecuted.

What happens if there is no incident response plan? ›

Without a structured incident response plan in place, organisations risk facing a myriad of challenges when dealing with cyber incidents. These challenges may include extended periods of system inactivity, prolonged investigation times, and difficulty in isolating and containing security breaches.

What happens if you don't report a data breach? ›

Failing to do so can result in heavy fines and penalties and an investigation by the Information Commissioner's Office (ICO).

What are the 5 steps of a data breach response plan? ›

These five steps are:
  • Containment. While 60% of data breaches are discovered within days, one Verizon report notes that 20% could take months to be identified. ...
  • Assessment. ...
  • Notification. ...
  • Investigation. ...
  • Remediation & Evaluation. ...
  • IT and Security. ...
  • Legal. ...
  • Public Relations.
May 16, 2023

Why am I in a data breach for a site I never signed up for? ›

When you search for an email address, you may see that address appear against breaches of sites you don't recall ever signing up to. There are many possible reasons for this including your data having been acquired by another service, the service rebranding itself as something else or someone else signing you up.

Does data breach mean hacked? ›

The key difference between a breach and a hack lies in the intent. A hack is the result of an intentional attack, while a breach is the result of an unintentional leak of information. Another way to look at this is to determine whether cybercriminals are part of the story — including internal rogue users.

How serious is a data breach? ›

“A personal data breach may, if not addressed in an appropriate and timely manner, result in physical, material or non-material damage to natural persons such as loss of control over their personal data or limitation of their rights, discrimination, identity theft or fraud, financial loss, unauthorised reversal of ...

What does it mean if my email was found in a data breach? ›

An email data breach can happen when there are security issues with an email. Meaning cybercriminals can gain access to your information through an organisation, website, or other places you have previously inputted your data. Email security breaches are a constant threat to anyone.

Top Articles
Latest Posts
Article information

Author: Lilliana Bartoletti

Last Updated:

Views: 5726

Rating: 4.2 / 5 (73 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Lilliana Bartoletti

Birthday: 1999-11-18

Address: 58866 Tricia Spurs, North Melvinberg, HI 91346-3774

Phone: +50616620367928

Job: Real-Estate Liaison

Hobby: Graffiti, Astronomy, Handball, Magic, Origami, Fashion, Foreign language learning

Introduction: My name is Lilliana Bartoletti, I am a adventurous, pleasant, shiny, beautiful, handsome, zealous, tasty person who loves writing and wants to share my knowledge and understanding with you.