Document Feedback - Review and Comment
Step 1 of 4: Comment on Document
How to make a comment?
1. Use this to open a comment box for your chosen Section, Part, Heading or clause.
2. Type your feedback into the comments box and then click "save comment" button located in the lower-right of the comment box.
3. Do not open more than one comment box at the same time.
4. When you have finished making comments proceed to the next stage by clicking on the "Continue to Step 2" button at the very bottom of this page.
Important Information
During the comment process you are connected to a database. Like internet banking, the session that connects you to the database may time-out due to inactivity. If you do not have JavaScript running you will recieve a message to advise you of the length of time before the time-out. If you have JavaScript enabled, the time-out is lengthy and should not cause difficulty, however you should note the following tips to avoid losing your comments or corrupting your entries:
-
DO NOT jump between web pages/applications while logging comments.
-
DO NOT log comments for more than one document at a time. Complete and submit all comments for one document before commenting on another.
-
DO NOT leave your submission half way through. If you need to take a break, submit your current set of comments. The system will email you a copy of your comments so you can identify where you were up to and add to them later.
-
DO NOT exit from the interface until you have completed all three stages of the submission process.
(1) This Data Breach Policy (Policy) relates to all (2) We want to ensure that any incident involving a breach of (3) Part 6A of the Privacy and Personal Information Protection Act 1998 (PPIP Act) establishes the NSW Mandatory Notification of Data Breach (MNDB) scheme. (4) The MNDB Scheme requires every NSW public sector agency, like us, to notify the Information Privacy Commissioner and affected individuals of eligible data breaches. (5) We are required to create a Data Breach Policy under section 59ZD of the PPIP Act (the Policy). Under the scheme, we make this Policy for managing eligible data breaches publicly accessible on our website and through our Policy Library. This enhances transparency and ensures that we remain accountable for the way we respond to data breaches. It also helps to enhance public trust and confidence in us. (6) The Vice-Chancellor is responsible for our compliance with the MNDB scheme. (7) We are committed to the protection of the (8) This Policy will coordinate collaboration between stakeholders and will operate in parallel with any response by a Digital Technology Solutions (DTS) Incident Management team and the DTS Cyber Security Incident Management team if the breach is also a cyber breach as may be required; as well as the Business Continuity Management Policy and Business Continuity Management Framework. (9) The Vice-Chancellor has sub-delegated the authority to perform certain duties in relation to data breaches to the General Counsel. (10) This Policy establishes the roles and responsibilities of staff in relation to managing a breach, and the steps we will follow when a breach occurs. (11) This Policy applies to circumstances where (12) This Policy applies to any actual or suspected data breach involving the following types of information, as defined by the Privacy Management Plan: (13) The MNDB scheme does not apply to data incidents or data breaches that do not involve (14) It is important to understand the terminology of the PPIP Act that applies to the MNDB scheme. (15) An eligible data breach occurs where: (17) The MNDB scheme applies to breaches of ‘ (18) The size, and nature of a breach, can have a significant impact on individuals affected by it. A breach can give rise to a range of actual or potential harm to individuals. These consequences can include financial fraud, identity theft, damage to reputation and even physical violence. For this reason, we will remain vigilant, when safeguarding the information, you provide to us. (19) Data breaches can also have serious consequences for us as well. A breach may create (20) Responding quickly when a breach occurs is critical, and it can substantially reduce the effect on those people impacted, reduce the costs to us of dealing with a breach, and reduce the potential reputational damage which may result. (21) We have a documented and operationalised Privacy Breach Response Plan for quickly and effectively responding to and managing data breaches. (22) In some cases, we will have notification obligations under both the MNDB scheme and under the Commonwealth Notifiable Data Breach (NDB) scheme and in some circumstances, notification obligations in other countries. (23) For example, a data breach that involves TFNs and is likely to result in serious harm would be reportable to both the Office of the Australian Information Commissioner (OAIC) under the Commonwealth NDB scheme, and the NSW Privacy Commissioner under the MNDB scheme. (24) The MNDB scheme has been designed to be consistent with and adopt, as far as possible, key features of the Commonwealth NDB scheme. For example, the MNDB scheme adopts the same thresholds for assessing and notifying data breaches so that we can meet both requirements with a single process. (25) This Policy outlines our overall strategy for managing data breaches from start to finish. Having a clear and well-defined Policy enables us to: (26) This Policy provides a high-level outline of steps that the (27) We have a dedicated Data Breach Response Team selected from (28) The Team has rehearsed privacy breach scenarios and learned from prior breach management to improve its performance. (29) Most data breaches, both in Australia and internationally, involve a human element (e.g., either through direct human error or cyber-attacks that rely on a human compromise). Building a well-trained and aware workforce is a strong front-line defence against breaches and other privacy risks. (30) This Policy encourages all (31) The quicker we can detect a data breach, the better the chance that it may be contained, and potential harms mitigated through prompt action. Actual or suspected data breaches must be reported by (32) This Policy outlines the kinds of processes we have in place for identifying data breaches, for example we employ technology solutions like detection software, firewalls, password and permission levels, and digital and physical access methods. Other measures for identifying and prevent data breaches include: (33) On occasions, we are required to outsource functions to external service providers (for example, for digital solutions). If this is the case, these relationships are usually covered by legally binding contracts, memorandums of understanding, or non-disclosure agreements. To ensure we meet our obligations under the PPIP Act, these agreements often include provisions in relation to the management and notification of data breaches and can extend to third-party assurances made in relation to assisting us manage third-party data breaches (including in relation to notification and remediation). (34) We adopt a privacy by design model and build privacy mitigation into our arrangements with third party service providers whenever we share (35) As both the external threat environment, and (36) Regular testing of the data breach response process is the best way to ensure that all relevant (37) This Policy is aligned with existing policies, procedures, and capabilities. This Policy should be read in conjunction with: (38) If a data breach includes a large volume of (39) Consistent with the definition of ‘eligible data breach’ in the PPIP Act, this Policy notes that a data breach may involve unauthorised access, unauthorised disclosure, or loss of (40) A data breach may be deliberate or accidental and may occur by a range of different means or channels, including but not limited to, loss or theft of physical devices, misconfiguration, or over-provisioning of access to sensitive systems, inadvertent disclosure, social engineering, or hacking. (41) Data breaches can happen in all manner of ways, for example, an email may be sent to the wrong email address, a paper file or an unprotected flash drive could be left in a taxi, a phishing email may contain a link that tricks the recipient into compromising their access credentials, or we may be the subject of a malicious cyber criminals. (42) This Policy outlines the steps we will take to respond to a reported, or suspected or confirmed data breach. (43) To help ensure responses to data incidents are easily and quickly put into action, we need to take the following steps: (44) We have in place contractual provisions that outline strategies for managing data breaches that may occur at business-critical suppliers or partners and affect (45) We may be required by contract or by other laws or administrative arrangements to take specific steps in response to a data breach. These may include taking specific containment or remediation steps, or engaging with or notifying external stakeholders (in addition to the Privacy Commissioner), where a data breach occurs. (46) Depending on the circumstances of the data breach and the categories of data involved, we may need to notify or engage with: (47) If, for example, we became aware of a criminal cyber-attack, that was an eligible data breach, we would report it to the NSW Police Force, as well the Information Privacy Commission New South Wales. (48) Our response plan includes a clear communication strategy that enables (49) The response plan outlines: (50) To be effective, the response plan and strategies outlined above must be quickly and effectively implemented and actioned. However, this depends on having (51) All (52) The Vice-Chancellor has the authority to issue notifications to the Privacy Commissioner, impacted individuals, and other data protection authorities. (53) The Data Breach Response Team is responsible for: (54) The Privacy and Right to Information Manager is responsible for: (55) The Director, Communications & Engagement is responsible for assisting to communicate with affected individuals and dealing with the media and external stakeholders. (56) The Chief Digital & Information Officer is responsible for assisting with establishing the cause, impact and containing any data breach that involves DTS systems, and assisting to review security and monitoring controls related to the breach (for example, access, authentication, encryption, audit logs). (57) (58) Service Providers are responsible for ensuring DTS systems and processes meet the relevant privacy requirements and that systems are regularly monitored for system failures and/or potential system vulnerabilities. Provision for future audits should be included in contractual terms where necessary when the transfer of personal information is proposed. (59) All (60) Preserving evidence for the management of data breaches can assist authorities investigate criminal activity. This may also help us to identify any weaknesses in security or processes that are prone to error. Monitoring of, and evidence from a number of small ‘near misses’ may identify a bigger systemic issue, which requires correcting. (61) Understanding what went wrong, how issues were addressed and whether changes were needed to processes and procedures following a breach will mitigate future risks and are key to ensuring we continue to proactively manage data breaches in line with regulator and community expectations. (62) We will include in our post-breach review:Data Breach Policy (Personal and Health Information)
Section 1 - Audience
Section 2 - Executive Summary
Section 3 - Purpose
Section 4 - Scope
When does the MNDB scheme not apply?
Section 5 - Terminology
Section 6 - The impact of a data breach
What if we are also required to notify the Commonwealth regulator?
What this policy includes
How have we prepared for a data breach?
Section 7 - Training and Awareness
Section 8 - Processes for identifying and reporting breaches
Appropriate provisions in contracts / other collaborations
Section 9 - Schedule for testing and update this Policy
Section 10 - Alignment with other policies
Section 11 - What is a data breach is and how to identify one?
Plan for managing data breaches
Response Plan to triage, contain, assess, notify and prevent
Top of Page
Section 12 - Strategies for managing supplier and / or partner agency breaches
Section 13 - Other obligations including external engagement or reporting
Section 14 - Clear communication strategy
Top of PageSection 15 - Capability, expertise, and resourcing
Top of PageSection 16 - Roles and responsibilities
Section 17 - Record keeping
Section 18 - Post-breach review and evaluation