Our website uses cookies so we can analyse our site usage and give you the best experience. Click "Accept" if you’re happy with this, or click "More" for information about cookies on our site, how to opt out, and how to disable cookies altogether.
We respect your Do Not Track preference.
On this page:
Download a copy of this policy (opens to PDF, 271KB).
A privacy breach covered by the Privacy Act 2020 (Part 6) occurs when personal information is lost or subjected to unauthorised access or disclosure, or where an incident prevents OPC from being able to access personal information (either temporarily or permanently). For good privacy practice purposes, this response plan also covers any instances of unauthorised use, modification or interference with personal information held by OPC. Privacy breaches can be caused or exacerbated by a variety of factors, affect different types of personal information and give rise to a range of actual or potential harms to individuals and entities.
This response plan is intended to enable OPC to contain, assess and respond to privacy breaches quickly, to help mitigate potential harm to affected individuals and to comply with Part 6(1) of the Privacy Act that commenced on 1 December 2020. Our actions in the first 24 hours after discovering a privacy breach are crucial to the success of our response.
The plan sets out contact details for the appropriate staff in the event of a privacy breach, clarifies the roles and responsibilities of staff, and documents processes to assist OPC to respond to a privacy breach.
OPC experiences privacy breach/privacy breach suspected |
|
What should the OPC staff member or contractor do? |
|
What should the manager do? |
|
Alert the Privacy Officer |
|
Some privacy breaches may be comparatively minor, and able to be dealt with easily without action from the privacy breach response team (response team).
For example, an OPC staff member may, as a result of human error, send an email containing personal information to the wrong recipient. Depending on the sensitivity of the contents of the email, if the email can be successfully recalled (only relates to internal emails), or if the staff member can contact the recipient and obtain an assurance that the recipient has deleted the email, it may be that there is no utility in escalating the issue to the response team.
Managers should use their discretion in determining whether a privacy breach or suspected privacy breach requires escalation to the response team. In making that determination, Managers should consider the following questions:
If the answer to any of these questions is ‘yes’, then the Manager should attempt immediate verbal contact with the Privacy Officer, or if this is not possible, another primary response team member.
The checklist below sets out the steps that the response team will take in the event of a serious privacy breach.
If a Manager decides not to escalate a minor privacy breach or suspected privacy breach to the response team for further action, the Manager should:
There is no single method of responding to a privacy breach. Privacy breaches must be dealt with on a case-by-case basis, by undertaking an assessment of the risks involved, and using that risk assessment to decide the appropriate course of action. Depending on the nature of the breach, the response team may need to include additional staff or external experts, for example an IT specialist/data forensics expert or a human resources adviser.
There are four key steps to consider when responding to a breach or suspected breach.
Step 1: Contain the breach
Step 2: Assess the risks associated with the breach
Step 3: Consider breach notification
Step 4: Review the incident and take action to prevent future breaches
The response team should ideally undertake steps 1, 2 and 3 either simultaneously or in quick succession. At all times, the response team should consider whether remedial action can be taken to reduce any potential harm to individuals.
The response team should refer to the checklist below. and to OPC’s guidance on responding to privacy breaches which provides further detail on each step.
Depending on the breach, not all steps may be necessary, or some steps may be combined. In some cases, it may be appropriate to take additional steps that are specific to the nature of the breach.
Following serious privacy breaches, the response team should conduct a post-breach review to assess OPC’s response to the breach and the effectiveness of this plan and report the results of the review to the OPC Senior Leadership Team. The post-breach review report should identify any weaknesses in this response plan and include recommendations for revisions or staff training as needed.
The response team should also consider the following documents where applicable:
Members of the response team should test this plan with a hypothetical privacy breach annually to ensure that it is effective. As with the post-breach review following an actual privacy breach, the response team must report to the OPC Senior Leadership Team on the outcome of the test and make any recommendations for improving the plan.
Documents created by the response team, including post-breach and testing reviews, should be saved in the following location:
OPC’s privacy management plan states that the internal handling of personal information will be an agenda item on the Senior Leadership Team meetings at least once each quarter and include a report of any privacy complaints against OPC and internal privacy breaches.
The General Manager should liaise with the Privacy Officer on the preparation of reports on internal privacy breaches.
Step 1: contain the breach |
Step 2: assess the risks for individuals associated with the breach |
Step 3: consider breach notification |
Step 4: Review the incident and take action to prevent future breaches |
Responsibilities |
|
|
Persons/areas affected |
ALL OPC staff and contractors |
|
Contact |
General Manager/ General Consel |
|
Approval authority |
Privacy Commissioner |
|
Last review date |
October 2021 |