Managing data breaches

Slides:



Advertisements
Similar presentations
Data Security Breach Code of Practice. Data Security Concerns Exponential growth in personal data holdings Increased outsourcing 3 rd countries cloud.
Advertisements

Software Architecture company logo Company Address and Web Address.
This tutorial will take approximately 15 minutes. Click here to advance. Click here to go back.
F ILLING OUT A PRIDE REPORT Due the 10 th of each month.
PRIVACY COMPLIANCE An Introduction to Privacy Privacy Training.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Data Protection for Church of Scotland Congregations
© Affiliated Computer Services, Inc. (ACS) 2010 ACS Encryption.
Requesting a New Password on ISEE Idaho State Department of Education January 6, 2012.
The Information Commissioner’s Office David Evans.
LBMS Homeroom is a learning management system which enables teachers and students to send and receive assignments and/or classroom materials.
How to Find Your Way Around… SEPT - MANDATORY TRAINING 1. You can play the PowerPoint, and find the Test here EXAMPLE COURSE.
What happens next? Ensure we know who you are – addresses for each member of each improvement team Register on the website Agree your own aims statement.
General Awareness Training Security Awareness Module 3 Take Action! Where To Go for Help.
Requesting a New Password on ISEE Idaho State Department of Education October 7, 2011.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Information Commissioner’s Office Sheila Logan Operations and Policy Manager Information Commissioner’s Office Business Matters 20 May 2008.
All Unit Charter Renewals are due at the respective District’s Roundtable Meeting in November Last Updated 9/29/15.
At the Log in page enter your college provided username and password then click submit to login to Owl Link.
Updating your center profile and compliance information online The center's primary contact and executive director each have access to center account information.
Data Protection Property Management Conference. What’s it got to do with me ? As a member of a management committee responsible for Guiding property you.
SharePoint Security Training Creating and Managing Users
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Log into MISIS at MISIS.LAUSD.NET/START Use you single sign on user name and password.
NERC Alerts Training Responding to Alerts September 22, 2009.
Log in with address and password. Select a Genre from the drop-down list...
Registering as a New User on ISEE Idaho State Department of Education January 12, 2016.
Updating Your Licenses and Software How to update your license for a new release of software.
Information Security January What is Information Security?  Information Security is about the physical security of our equipment and networks as.
Information Security TechLink Seminar, 17 April 2013 James Knapton, Information Compliance Officer, Registrary’s Office.
Sharing Personal Data ‘What you need to know’ Corporate Information Governance Team Strategic Intelligence.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
The Data Protection Act 1998
LBMS Homeroom is a learning management system which enables teachers and students to send and receive assignments and/or classroom materials.
Supplier Portal Self-Registration
Data Protection Session
STAR Chart Instruction
Overview What is a privacy breach? 2. Examples of privacy breaches 3. Consequences of privacy breaches 4. Steps to handling a privacy breach.
The Data Protection Act 1998
CCA myLink Learning Center Overview
Timesheets in HRMS Enter Hours worked View Previous Timesheets
Unable to set your Webroot account password While logging in to the account, if any message Can't log in? appear on your screen. Then, Click on the link.
Effective Solutions To Recover Apple ID if Password Address or Security Questions are forgotten 1. Use the Address Linked to Your Apple ID.
Unable to set your Webroot account password While logging in to the account, if any message Can't log in? appear on your screen. Then, Click on the link.
GENERAL DATA PROTECTION REGULATION (GDPR)
Cyberforum 2018 March 8, 2018 Los Angeles GDPR & SECURITY
Reporting personal data breaches to the ICO
Move this to online module slides 11-56
Incident Reporting Webinar Begins at 12.30
Security measures Introducing Risk Assessment in GDPR
European Championships 2017
MyHR and Data Protection
G.D.P.R General Data Protection Regulations
Understand Risks to IT Security
Online Pride Report System Contents
What You MUST Do Be aware of what constitutes Personally Identifiable Information (PII) Protect this information and passwords that.
To create a permanent ‘my folder’ in Discovery:
Detecting, reporting & investigating data breaches under GDPR
 How does GDPR impact your business? Pro Tip: Pro Tip: Pro Tip:
GDPR Quiz Today’s trainer: Click here to use Kahoot! 1
References & Recommendations
Letters of Recommendation:
General Data Protection Regulation Q & A Session
Handling Information Securely
What You MUST Do Be aware of what constitutes Personally Identifiable Information (PII) Protect this information and passwords that.
Completing the Primary Reference portion of the Student Profile
The first time you login in to the upgraded system, please select ‘Forgotten your password?’ to reset your password before using the system.
References & Recommendations
Presentation transcript:

Managing data breaches A data breach is a breach of data security that leads to accidental or unlawful destruction, loss, alteration or unauthorised disclosure of personal data. It includes sending emails to the wrong person, carelessness with passwords and leaving personal data on desks. If the breach is likely to put at risk individual’s personal data then within 72 hours of the breach it should be disclosed to the Information Commissioner’s Office using the following link https://report.ico.org.uk/security-breach/. If the breach has put the individual’s data at high risk they should be told about the breach. Responsible Complete Identify who deals with data breaches  Ensure everyone knows who handles data breaches Train everyone on what amounts to a data breach Data breach occurs – immediately notify person responsible for handling breaches Liaise with the appropriate people to minimise the impact of the breach Enter breach details into the breach log (click ‘here’ to access) Make recommendations to a director as to whether the Information Commissioner’s Office should be notified of the breach along with any individuals Notify the ICO of the breach if appropriate within 72 hours Complete the breach log Ensure a discussion about the breaches contained within the breach log is added to any leadership risk review Follow up each breach with processes and learnings to ensure that it doesn’t happen again Review common causes of breaches and address with new processes/training