Content library
Digital security overview
66: Tietoturvaloukkausten hallinta

How to fill the requirement

Digital security overview

66: Tietoturvaloukkausten hallinta

Task name
Priority
Status
Theme
Policy
Other requirements
Management and documentation of data breaches
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Incident management
Data breach management
requirements

Task is fulfilling also these other security requirements

18.1.4: Privacy and protection of personally identifiable information
ISO27 Full
TSU-14: Tietoturvaloukkaukset
Julkri
5.34: Privacy and protection of PII
ISO27k1 Full
66: Tietoturvaloukkausten hallinta
Sec overview
P6.5: Notification of unauthorized disclosure of personal information from third parties
SOC 2
1. Task description

The organization must document all personal data breaches and their consequences and the corrective actions taken, regardless of the action ultimately resulting from the breach.

Failure to comply with the documentation obligation or notification is contrary to GDPR and may lead to sanctions defined on the regulation.

Reporting personal data breaches to authorities / data subjects
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Incident management
Data breach management
requirements

Task is fulfilling also these other security requirements

33. Notification of a personal data breach to the supervisory authority
GDPR
34. Communication of a personal data breach to the data subject
GDPR
16.1.5: Response to information security incidents
ISO27 Full
6.1.3: Contact with authorities
ISO27 Full
A.10.1: Notification of a data breach involving PII
ISO 27018
1. Task description

A personal data breach must be reported to the supervisory authority if the breach may pose a risk to data subjects rights and freedoms. Data subjects, on the other hand, must be informed if the breach is likely to pose a high risk to their rights and freedoms. For example, registrants may take steps to reduce the adverse effect (e.g. by closing their credit card).

The notification must include the following information:

  • a clear description of the personal data breach
  • the name and contact details of the data protection officer or other contact point from which further information can be obtained
  • the likely consequences of the personal data breach
  • the measures proposed or already taken by the controller; where appropriate, measures to mitigate possible adverse effects.
Detailed assessment of the risk of data breach for data subjects
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Incident management
Data breach management
requirements

Task is fulfilling also these other security requirements

34. Communication of a personal data breach to the data subject
GDPR
6.1.3: Contact with authorities
ISO27 Full
16.1.5: Response to information security incidents
ISO27 Full
RS.CO-3: Information sharing
NIST
66: Tietoturvaloukkausten hallinta
Sec overview
1. Task description

The controller must assess the risk of the personal data breach to the data subjects. The assessment must take into account, for example, the following:

  • How likely is it that the data will be used to cause harm?
  • What harm could the data be used for (e.g. identity theft, fraud, psychological distress, humiliation or reputational damage)?
  • Nature, sensitivity and amount of personal data
  • How easy it is to identify the registrant using the data?
  • Are there many children or otherwise vulnerable people among the registrants?

The risk assessment affects the urgency and scope of reporting a breach.

No items found.