(1) This Procedure supports the Data Breach Policy and outlines the processes for the identification, reporting and initial mitigation of data breaches which occur in relation to information held by UQ. (2) This Procedure applies to all UQ Staff. (3) This Procedure is consistent with and complements other response plans and procedures, including the Critical Incident Management Plan (staff login required, via the Enterprise Risk website) and the Cyber Security Incident Response Procedure. (4) Data breach management at UQ is managed by various stakeholders depending on the nature of the data breach and relies on collaboration between organisational units and functions across UQ. (5) UQ Staff are responsible for reporting any data breaches in accordance with the Data Breach Policy and this Procedure. (6) The decision on how to respond to a data breach should be made on a case-by-case basis by applying the Data Breach Policy, this Procedure and any other relevant response plan or procedure. (7) Where a data breach occurs, other UQ policies, plans and procedures might also be triggered. (8) This Procedure should be read in conjunction with other policies, plans and procedures and may complement those processes. (9) A data breach can occur in a number of ways, for example, where: (10) A data breach extends to any information held by UQ, including (but not limited to): (11) All UQ Staff should consider whether an actual or suspected data breach may have occurred when it appears that there may have been: (12) If an actual or suspected data breach is identified, staff must: (13) If staff are unsure as to whether an actual or suspected data breach has occurred, or they need guidance on the immediate type of containment action to take, contact a Privacy Officer through the UQ Privacy website or at privacy@uq.edu.au. (14) When an actual or suspected data breach is identified, UQ Staff must consider whether any appropriate actions can be undertaken to contain the data breach. In doing so, care should be taken to ensure that any containment activity does not destroy information that might be needed to investigate the breach and prevent a recurrence. (15) Some examples of potential containment options are outlined below: (16) UQ Staff are encouraged to: (17) Upon notification of a data breach, a Privacy Officer will conduct an initial assessment to determine the most appropriate way to manage the breach, having regard to the nature of the breach. This assessment will include: (18) When there is a data breach that does involve the unauthorised access to or disclosure or loss of personal information, the Privacy Officer may identify and recommend to the Data Breach Committee that a Data Breach Response Team be established to manage the response to incidents. (19) Where a Data Breach Response Team is established, it will: (20) Where the data breach relates to personal information and the Data Breach Response Team has not been established, the Privacy Officer will: (21) The Data Breach Committee is responsible for: (22) Where required by law, data breaches will be reported in accordance with legal requirements. Relevant requirements may include (but are not limited to): (23) The Privacy Officer is responsible for maintaining the Eligible Data Breach Register as required by the IP Act. (24) After each actual or suspected data breach, the Privacy Officer, in consultation with key stakeholders and the Data Breach Response Team (where applicable) will prepare a report for the Data Breach Committee outlining: (25) Quarterly reports will be prepared and presented to the University Senior Executive Team and the Senate Risk and Audit Committee outlining the data breaches that have occurred over the previous quarter, the actions taken to contain and mitigate those breaches, with additional information about data breaches that meet the threshold of being eligible data breaches under the IP Act. (26) The Vice-Chancellor is ultimately accountable for ensuring the University meets its privacy obligations and does this through oversight of the application of policies and procedures designed to satisfy those obligations through regular reporting mechanisms. (27) UQ Staff are responsible for: (28) The Data Breach Committee comprises: (29) The Data Breach Committee is responsible for: (30) The Data Breach Committee will receive support from the Director of Cyber Security; Director of Infrastructure Operations; Associate Director, Risk; Associate Director, Governance and Policy; and other UQ Staff as required. (31) The Chief Operating Officer is accountable for: (32) The Data Breach Response Team will be a multi-disciplinary team, having regard to the specific nature of the data breach. The team will usually comprise a Privacy Officer, the Information Domain Custodian, and other relevant stakeholders from across the University (such as Legal Services, Marketing and Communications, Governance and Risk, and Information Technology Services). (33) The Data Breach Response Team will be responsible for: (34) A Privacy Officer is responsible for: (35) The Chief Operating Officer will:Data Breach Procedure
Section 1 - Purpose and Scope
Section 2 - Process and Key Controls
a. where the data breach is also a critical incident: the Critical Incident Management Plan. The plan will guide the Critical Incident Management Team in anticipating, responding to, recovering and learning from critical incidents that may negatively impact UQ.
b. where the data breach relates to a cyber event: the Cyber Security Incident Response Procedure. The Procedure will guide UQ’s response to the cyber security incident.
c. where the data breach relates to corrupt conduct: the Fraud and Corrupt Conduct Policy and Fraud and Corrupt Conduct Procedure. The Policy and Procedure will set out how UQ will assess and deal with complaints or information about the corrupt conduct.
a. where the data breach relates to personal information, then the nature of the breach must be assessed to establish if it is an eligible data breach in accordance with the Data Breach Policy and this Procedure.
b. a Data Breach Response Team may be established to ensure the data breach is sufficiently managed having regard to UQ’s legal obligations.
c. reporting to the Data Breach Committee occur.Section 3 - Principles and key requirements
Part A - Identification and reporting of an actual or suspected data breach
Part B - Containment and mitigation
Data breach
Possible containment option
Email containing personal information sent to incorrect recipient.
Ask the recipient to delete the email and request that the recipient confirms deletion of the information in writing.
Internal system releasing personal information incorrectly.
Contact ITS immediately to suspend the system and stop all data release. This can be done by contacting the application technical owner (or submit an ITS Support Request).
Unauthorised access to a work computer. **
Report a cyber security concern immediately to ITS, and ask them to change passwords and any other access requirements to the computer.
Unauthorised access to a work database containing personal information. **
Report a cyber security concern immediately to ITS, and ask them to review all users with access to the database and restrict access as necessary. ITS may also need to consider changing passwords to access the database.
Cyberattack/phishing attack/ malicious actor **
Report a cyber security concern immediately to ITS.
Lost device
Report a cyber security concern immediately to ITS.
Part C - Assessment of the data breach
his approach is recommended particularly for incidents where a multi-disciplinary response is required.
By way of example, a Data Breach Response Team could include representation from Information Technology Services, Governance and Risk Division, Legal Services, Marketing and Communications, the Information Domain Custodian and a Privacy Officer to ensure a considered and managed response.
Part D - Notification and reporting
Part E - Monitoring and review
Section 4 - Roles, Responsibilities and Accountabilities
Vice-Chancellor
UQ Staff
Data Breach Committee
Chief Operating Officer
Data Breach Response Team
Privacy Officer
Top of Page
Section 5 - Monitoring, Review and Assurance
Top of PageSection 6 - Appendix
Definitions
Defined term
Meaning
Data breach
As defined in the IP Act, is where, in relation to information held by UQ, there has been either:
- unauthorised access to, or unauthorised disclosure of, the information; or
- the loss of the information in circumstances where unauthorised access to, or unauthorised disclosure of, the information is likely to occur.
Eligible data breach
As defined in the IP Act, is a data breach where personal information held by UQ is:
- accessed or disclosed without authorisation and this is likely to result in serious harm to the individual that it relates to; or
- lost, and unauthorised access or disclosure is likely, and this is likely to result in serious harm to the individual that it relates to.
IP Act
The Information Privacy Act 2009 (Qld).
Personal information
As defined in the IP Act, to be information about, or an opinion about, an identified individual or an individual who is reasonably identifiable from the information or opinion:
- whether the information or opinion is true or not; and
- whether the information or opinion is recorded in a material form or not.
Privacy Officer
The UQ Staff who have day to day responsibility for the management of privacy matters, including privacy complaints.
Serious harm
As defined in the IP Act:
- Serious physical, psychological, emotional, or financial harm to the individual because of the access or disclosure; or
- Serious harm to the individual's reputation because of the access or disclosure.
Unauthorised access
Information held by UQ is accessed by someone who is not authorised to do so.
Unauthorised disclosure
Intentional or unintentional disclosure, without permission, of personal information held by UQ.
UQ Staff
Including:
- members of the UQ Senate
- all UQ employees, including continuing, fixed-term, research (contingent funded) and casual employees
- persons acting in an honorary or voluntary capacity for or at UQ, including work experience students
- affiliates.
View current
This is the current version of the approved document. You can provide feedback on this document to the Enquiries Contact - refer to the Status and Details tab from the menu bar above.
For example:
For instance, if the data breach is also a cyber breach, then the Cyber Security Incident Response Procedure will be activated, but this Procedure will also require that (not exhaustive):
Top of Page** Reports to ITS and Cyber Security can be made through the Tell us about a cyber security concern or incident website.