Responding to a data breach will be conducted on a case-by-case basis to account for the varied types of data breaches that may occur. However, Treasury’s strategy for responding to data breaches will generally cover the following steps:
- Step 1: escalate the data breach
- Step 2: contain and mitigate the data breach
- Step 3: assess the likelihood of serious harm from the data breach
- Step 4: notify people about the data breach, where required or otherwise warranted
- Step 5: implement preventative actions to minimise the likelihood of a similar data breach reoccurring.
Every officer in our agency has a responsibility to escalate and support the management of data breaches.
Step 1: How do we escalate data breaches?
Internal staff are expected to report data breaches to their managers, to the Privacy Team Officers for assessment under the Notification Scheme, and to Information Services for assessment as a security incident.
External entities (including other agencies, 3rd parties, or members of the public) may report a data breach by emailing:
- the Queensland Revenue Office (QRO) Privacy Contact Officer on QROprivacy@treasury.qld.gov.au if the breach relates to QRO (including the State Penalties Enforcement Registry, SPER)
- the Treasury Privacy Manager & Contact Officer at privacy@treasury.qld.gov.au if the breach relates to Queensland Treasury other than QRO.
The Privacy Team Officers will undertake or recommend any additional escalations/reports under privacy legislation, and Information Services will undertake any processes or notifications required under IS18.
Any report to the Privacy Team Officers will need to include details about the personal information involved in the breach and circumstances surrounding the breach, to inform Treasury’s containment/mitigation actions and our assessment.
Step 2: What do we do to contain and mitigate a data breach?
At this stage of a breach, we are taking steps to limit the extent and duration of the breach, and make any effects from the breach less harmful. We may take the following actions to contain and mitigate a data breach:
- making efforts to recover the personal information
- securing, restricting access to, or shutting down breached systems
- suspending the activity that led to the data breach
- revoking or changing access codes or passwords.
The business group (or statutory body administered within our agency) impacted by the data breach will collaborate as needed with the Privacy Team Officers and Information Services to take any containment and mitigation actions.
We have an immediate and ongoing obligation to contain the data breach and mitigate any harm while we manage our assessment of, and response to, the data breach.
To determine the appropriate containment or mitigation actions, we may consider the following questions.
- What happened to cause the data breach, and can interim controls be implemented?
- Do we need to work with any third parties, other agencies, or service providers to investigate and resolve the data breach?
- Can the personal information be recovered?
- Can the person who has received personal information incorrectly be contacted?
- Can the system which has been breached be shut down?
Step 3: How do we assess data breaches?
The Privacy Team Officers will assess the data breach to understand privacy risk (including an assessment to understand if the breach may be an eligible data breach), any likely consequences, and recommended next steps to be taken.
As part of this assessment, we may consider the following questions.
- Is personal information impacted by the data breach?
- What type of personal information is involved?
- Who are the people potentially affected by the data breach?
- What was the cause of the data breach?
- Should we contact any other internal or external subject matter experts (e.g. technical investigators or auditors, People & Culture, Information Services or Legal Services)?
- What is the likelihood of serious harm to the affected individuals – is there an “eligible data breach”?
- What steps should be taken by the agency to minimise or avoid any potential harm to individuals?
- Does the agency need to notify anyone (on a mandatory or voluntary basis)?
- Do any exemptions to notification under the Notification Scheme apply in the circumstances?
This assessment needs to be completed within 30 days of our agency becoming aware of the data breach. If we cannot complete our assessment within 30 days, we can extend that timeframe as we reasonably require.
Step 4: When do we notify people about data breaches?
If our assessment means that we know, or reasonably believe, that a data breach is an eligible data breach then we must, as soon as practicable:
- notify the Information Commissioner
- notify affected individuals.
Please see the section below explaining how we handle notifications of eligible data breaches.
Step 5: How do we prevent future data breaches?
We endeavour to learn lessons from any data breaches so we can minimise the risk of similar incidents reoccurring. As part of future breach prevention, we may consider the following questions.
- Can we provide training to our officers?
- What was the root cause of the data breach?
- Can we update our existing internal processes?
- Does our internal register of eligible data breaches show any reoccurring issues?
- Can we permanently implement any of the interim containment or mitigation actions taken in response to the breach?