To ensure your protection, it is important that we have a policy in place to highlight the action we will take should a breach of our personal data policy take place.
‘Breach’ definition
A “personal data breach” is “a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data transmitted, stored or otherwise processed”. Breaches may be accidental or deliberate.
Kristian Barker
kbarker@jdforecasting.com
+44 (0)161 486 5005
J+D Consulting Limited, Landmark House, Station Road, Cheadle Hulme, Cheshire, SK8 7BS
Should you feel that your question or concern has been inadequately handled, you have a right to lodge a complaint with the Information Commissioner’s Office:
https://ico.org.uk/concerns/
0303 123 1113
J+D registration reference: ZA320493
- Destruction means the data no longer exists or no longer exists in a form that is of any use to the controller/processor
- Damage refers to the data being altered, corrupted or is no longer complete
- Loss” means the data may still exist, but control of it or access to it has been lost or it’s no longer in the possession of those that should have it
- Unauthorised or unlawful processing may include disclosure of personal data to (or access by) recipients who are not authorised to receive (or access) the data, or any other form of processing which violates the GDPR.
- At the beginning of each project, we will agree with all parties the data being collected, those processing the data and the safeguards in place to ensure this data is handled appropriately
- At the end of each project, we will review the original data process agreement and ask all parties to confirm that no data breach has taken place and that the data will be destroyed in accordance with the agreed destruction timeframe
- Review security systems annually or when significant changes are being made to our IT infrastructure
- USB devices and attaching personal data to emails will no longer be used (unless securely encrypted)
- Understand the source/ reason for the data breach
- Remove the data from its current location (if applicable, depending on the nature of the breach)
- Retrieve the data from where it has been sent (if applicable, depending on the nature of the breach)
- Review the underlying data policy to understand how this breach has occurred and how we can prevent this from happening in the future
- What caused the breach to occur
- The specific details of what happened
- The personal data affected, including the types and numbers of records and individuals
- The consequences and potential consequences of the breach
- Remedial action taken – to deal with breach and mitigate its impact
- Explanation of the decision to notify or not to notify the ICO/ individuals affected