Data Protection Breach Management Policy
Data Protection Breach Management Policy
Please check the HSE intranet for the most up to date version of this policy
http://hsenet.hse.ie/HSE_Central/Commercial_and_Support_Services/ICT/Policies_and_Procedures/Policies/
Reader Information
Information/data is one of our most important assets and each one of us has a
responsibility to ensure the security of this information. Accurate, timely, relevant and
properly protected information/data is essential to the successful operation of the HSE
in the provision of services to our patients and clients.
This policy is mandatory and by accessing any of the HSE’s Information/data, users
are agreeing to abide by the terms of this policy.
2.0 Scope
This policy represents the HSE’s national position and takes precedence over all other
relevant policies which may have been developed at a local level. The policy applies
to all HSE employees, service providers, contractors and third parties that access, use,
store or process information on behalf of the HSE. This policy is authorised by the
Senior Management of the HSE.
3.0 Legislation
The HSE has an obligation to abide by all relevant Irish legislation and European
legislation. The relevant acts, which apply in Irish law to Information Systems,
include but are not limited to:
3
4.0 Policy
It is the policy of the HSE that in the event that an information/data breach happens,
the following breach management plan is strictly adhered to.
It is important that each HSE Directorate puts into place their own local procedures to
enable them to implement the breach management plan should such a data breach
occur. There are five elements to any breach management plan:
Directorates must put in place procedures that will allow any staff member to report
any information/data security breach.
• It is important that all staff are aware to whom they should report such a
breach.
• Having such a procedure in place will allow for early recognition of the breach
so that it can be dealt with in the most appropriate manner.
• Details of the breach should be recorded accurately, including the date and
time the breach occurred, the date and time it was detected, who/what reported
the breach, description of the breach, details of any ICT systems involved,
corroborating material such as error messages, log files, etc.
Containment involves limiting the scope and impact of the breach of data/information.
If a breach occurs, Directorates should:
• Decide on who would take the lead in investigating the breach and ensure that
the appropriate resources are made available for the investigation.
• Establish who in the organisation needs to be made aware of the breach and
inform them of what they are expected to do to assist in the containment
4
exercise. For example, this might entail isolating a compromised section of the
network, finding a lost file or piece of equipment, or simply changing access
codes to server rooms, etc.
• Establish whether there is anything that can be done to recover losses and limit
the damage the breach can cause.
In assessing the risk arising from the security breach, Directorates should consider
what would be the potential adverse consequences for individuals, i.e. how likely it is
that adverse consequences will materialise and, in the event of materialising, how
serious or substantial are they likely to be. In assessing the risk, Directorates should
consider the following points:
• What could the information/data tell a third party about the individual?
5
• Any recommended changed to policies and/or procedures should be
documented and implemented as soon as possible thereafter.
• The implementation of this policy and all other relevant HSE policies within
the business areas for which they are responsible.
• Ensuring that all HSE employees who report to them are made aware of and
are instructed to comply with this policy and all other related HSE policies.
• Consulting with the Consumer Affairs &/or the ICT Directorate in relation to
the appropriate procedures to follow when a breach of this policy has
occurred.
6.2 Users
• Complying with the terms of this policy and all other relevant HSE policies,
procedures, regulations and applicable legislation;
• Reporting all misuse and breaches of this policy to their line manager.
7.0 Enforcement
The HSE reserves the right to take such action as it deems appropriate against users
who breach the conditions of this policy. HSE employees who breach this policy may
be denied access to the organizations information technology resources, and maybe
subject to disciplinary action, including suspension and dismissal as provided for in
the HSE disciplinary procedure.