(1) This Policy establishes the principles for reporting and responding to a data breach and an eligible data breach. The Policy identifies roles and responsibilities, the mechanisms in place to prevent data breaches from occurring and the University’s reporting and notification requirements if an eligible data breach has occurred. The Policy aims to assist the University in avoiding or minimising harm to affected individuals as a result of data breaches. (2) This Policy has been developed in line with the Privacy and Personal Information Protection Act 1998 (NSW)(PPIP Act) and the guidance from the Information and Privacy Commission New South Wales. (3) The University must comply with the PPIP Act and the Health Records and information Privacy Act 2002 (NSW)(HRIP Act)in respect of Personal and Health Information it collects and uses. (4) Through the introduction of a Mandatory Notification of Data Breach Scheme (MNDB Scheme),the PPIP Act requires the University to notify the Information and Privacy Commission New South Wales and affected individuals of data breaches involving Personal Information that are likely to result in serious harm. (5) Personal Information for the purposes of the MNDB Scheme includes information about an individual’s physical or mental health, disability and information connected to the provision of a health service. (6) The University’s Controlled Entities which are considered organisations within the meaning of the Privacy Act 1998 (Cth) must comply with the Notifiable Data Breaches (NDB) scheme governed by the Australian Information Commissioner. The requirements of the MNDB scheme are broadly aligned with the NDB scheme. (7) This Policy applies to: (8) The University is committed to effective management and governance of its data and information and the privacy rights of its Students, Staff and Affiliates, and third parties. (9) The University implements a range of activities and controls to ensure the security of data and information and that privacy obligations are met, including staff training, guidance, and policy review/development. (10) The University will ensure there are security safeguards in place, as are reasonable in the circumstances, to protect Personal Information held by the University against loss, unauthorised access, use, modification or disclosure, and any other misuse. (11) All Staff, Students, and Affiliates of the University have a responsibility to report actual or suspected data breaches in a timely manner. (12) The University recognises the value and importance of responding to suspected or actual data breaches quickly and efficiently. (13) The University will take all reasonable and necessary steps to contain data breaches and minimise the harm to affected individuals. (14) A data breach occurs when information held by the University is subject to unauthorised access, disclosure, or is lost in circumstances where the loss is likely to result in unauthorised access or disclosure. (15) A data breach may be caused by malicious action (by an external or insider party), human error, or a failure in information handling or security systems. Examples of data breaches include: (16) The MNDB Scheme applies where an ‘eligible data breach’ has occurred. (17) An eligible data breach occurs when: (18) Serious harm occurs where the harm arising from the eligible data breach has, or may, result in a real and substantial detrimental effect to the individual, which is more than irritation, annoyance or inconvenience. Harm may include physical harm, economic, financial or material harm, emotional or psychological harm, reputational harm, and other forms of serious harm that a reasonable person would identify as a possible outcome for the data breach. (19) An eligible data breach can occur within the University, between the University and another public sector agency, or by an external person or entity accessing data held by the University without authorisation. (20) The University will undertake a systematic approach to managing any data breach, which includes the key activities outlined in this Procedure. (21) A data breach or suspected data breach can be reported through several means, including but not limited to: (22) All University Staff, Students and Affiliates are responsible for identifying a data breach or suspected data breach and promptly reporting it to either the: (23) The Cyber Security Team will validate any identified data breach or suspected data breach and confirm whether data and/or Personal Information has been compromised. (24) When a data breach has been confirmed, the Cyber Security Team will immediately make all reasonable efforts to perform restrictive and containment activities to ensure that no further breaches can occur. The containment measures will depend on the nature of the breach and can involve changing IT controls, physical controls, process-oriented controls, and any other containment measures such as shutting down, suspending, or isolating systems or disabling compromised accounts, that restrict the incident from further impacting the University. (25) Once the data breach has been validated and restricted/contained, the Privacy Officer, in consultation with relevant University officers, will determine whether there are reasonable grounds to suspect there may have been an eligible data breach and if confirmed, will refer this to the Vice-Chancellor for the appointment of an Assessor. (26) The Vice-Chancellor will appoint a Staff member or external party not involved in an action or omission that led to the eligible data breach (Assessor) to conduct an assessment of an identified potential data breach to understand the risk of harm to affected individuals. The University will take all appropriate steps to limit the impact of a data breach. If requested, the Assessor must provide information and updates to the Privacy Officer about the assessment. (27) As soon as possible but no later than 30 days of becoming aware of a data breach, the Assessor will carry out an assessment of whether the data breach is, or there are reasonable grounds to believe the data breach is, an eligible data breach. (28) The Assessor may engage necessary advisors and expertise as required. (29) The key considerations for assessment include the types and sensitivity of Personal Information involved in the breach and the nature of the harm that has occurred or may occur. A non-exhaustive list of factors that may be considered when assessing a data breach include: (30) If an assessment cannot reasonably be conducted within 30 days, the Assessor will propose an extension period to the Vice-Chancellor, who will determine and approve the additional amount of time reasonably required to conduct the assessment. (31) If an extension period is approved, the Vice-Chancellor, or a person with delegated authority, will give written notice of this to the Privacy Commissioner. (32) If the eligible data breach is considered a critical incident under the Incident Management Policy, the Assessor (if requested) must provide updates and information to the Critical Incident Management Team. (33) Each data breach will be assessed on an individual basis. (34) The Privacy Officer must notify the Privacy Commissioner immediately of an eligible data breach. (35) Unless an exemption applies, the Privacy Officer, in consultation with relevant University officers, will take reasonable steps to notify: (36) The method of notification will be determined on a case-by-case basis and may include communication through Student or Staff email accounts or telephone. (37) The Privacy Officer, in consultation with the relevant officers of the University, will also determine whether notification to other third parties is necessary. Depending on the nature of the eligible data breach, this may include the police, insurance providers, financial institutions, or external agencies impacted by the eligible data breach. (38) The Privacy Officer will develop a data breach communications strategy to identify roles and responsibilities in the event of an eligible data breach. The strategy will outline responsibilities for communications, establish the expected timeframes for notification and a template for communications to notify required individuals. (39) After the data breach has been restricted/contained, the Cyber Security Team will ensure that the root cause of the issue has been addressed, to also prevent subsequent compromises. This may involve making permanent changes to a system, process, or physical property to ensure the original weakness no longer exists. (40) The Cyber Security Team will take measures to return to normal operations which may involve removing the special containment measures with confidence that the root cause of the weakness no longer exists. (41) The Cyber Security Team will conduct a post breach review and consider what improvements can be made to processes, systems, or controls on an ongoing basis to prevent the data breach from reoccurring. (42) The review and evaluation report will be provided to the Chief Information Security Officer for consideration and submitted to the Chief Information and Digital Officer, prior to recommendation to relevant stakeholders. The report may include recommendations such as: (43) The University publishes a notification register on its Privacy webpage, maintained by the Privacy Officer, which lists any eligible data breaches that required notification to the Privacy Commissioner and public notification to impacted individuals, where relevant. (44) The University also maintains an internal register of data breaches, including eligible data breaches, which is updated by the Chief Information Security Officer and the Privacy Officer. (45) The University will retain records relating to data breaches, including eligible data breaches, in line with the Records and Information Management Policy. (46) The University has the following preventative measures in place to prepare for a data breach: (47) All Staff, Students and Affiliates of the University are responsible for: (48) The Chief Information Security Officer is responsible for: (49) The IT Service Desk is responsible for: (50) The Privacy Officer is responsible for: (51) Managers/Supervisors are responsible for: (52) Executive Group members are responsible for: (53) The Vice-Chancellor is responsible for: (54) Nil. (55) The following definitions apply for the purposes of this Policy:Data Breach Policy
Section 1 - Purpose
Background
Scope
Top of PageSection 2 - Policy
Principles
Data Breach
Eligible Data Breach
Section 3 - Procedures
Responding to a Data Breach
Reporting
Validation
Restriction/Containment
Assessment
Communications
Root Cause Eradication and Return to Normal Operations
Post Breach Review and Evaluation
Record Keeping
Preventative Measures
Roles and Key Responsibilities
Top of PageSection 4 - Guidelines
Section 5 - Definitions
View Document
This is the current version of this document. You can provide feedback on this document to the document author - refer to the Status and Details on the document's navigation bar.
there are provisions around the disposal of data upon contract termination.
The University’s agreement templates are reviewed and updated on a regular basis to ensure regulatory changes are addressed.