Comments

Document Feedback - Review and Comment

Step 1 of 4: Comment on Document

How to make a comment?

1. Use this Protected Document to open a comment box for your chosen Section, Part, Heading or clause.

2. Type your feedback into the comments box and then click "save comment" button located in the lower-right of the comment box.

3. Do not open more than one comment box at the same time.

4. When you have finished making comments proceed to the next stage by clicking on the "Continue to Step 2" button at the very bottom of this page.

 

Important Information

During the comment process you are connected to a database. Like internet banking, the session that connects you to the database may time-out due to inactivity. If you do not have JavaScript running you will receive a message to advise you of the length of time before the time-out. If you have JavaScript enabled, the time-out is lengthy and should not cause difficulty, however you should note the following tips to avoid losing your comments or corrupting your entries:

  1. DO NOT jump between web pages/applications while logging comments.

  2. DO NOT log comments for more than one document at a time. Complete and submit all comments for one document before commenting on another.

  3. DO NOT leave your submission half way through. If you need to take a break, submit your current set of comments. The system will email you a copy of your comments so you can identify where you were up to and add to them later.

  4. DO NOT exit from the interface until you have completed all three stages of the submission process.

 

Personal Data Security Breach Management Procedure

Section 1 - Introduction

Purpose and Parent Policy

(1) Under the Data Protection Acts (Data Protection Act, 1998;Data Protection Act 2018) and the General Data Protection Regulation (GDPR), Hibernia College is obliged to keep personal data safe and secure and to respond promptly and appropriately in the event of a personal data security breach. This procedure lays out the steps to be followed by the College in the event that a personal data security breach or suspected personal data security breach occurs. 
The Personal Data and Records Policy is the parent policy. 

Responsibilities

Student Responsibilities

(2) Students have a responsibility to report any breach or suspected breach of personal data to the Records and Data Manager as soon as they become aware of such a breach.  

Staff, Faculty and Adjunct Faculty Responsibilities

(3) The Records and Data Manager is responsible for fulfilling the role of Data Protection Officer in the management of this procedure.

(4) All Staff, Faculty and Adjunct Faculty are responsible for engaging with, and adhering to, this procedure as required.

(5) All Staff, Faculty and Adjunct Faculty are responsible for reporting any breach or suspected breach of personal data to the Records and Data Manager without delay. 

Top of Page

Section 2 - Procedure for Managing Personal Data Security Breaches

Part A - What is a data breach?

(6) A personal data security breach is any incident which gives rise to an unauthorised disclosure, loss, destruction or alternation of personal data held by the College in any format. This includes any breaches which result from malicious conduct, lack of appropriate security controls, system or human failure or error. Personal data security breaches can happen for a number of reasons, including:

  1. The disclosure of confidential data to unauthorised individuals
  2. Loss or theft of data or equipment on which data is stored
  3. Loss or theft of paper records
  4. Inappropriate access controls allowing unauthorised use of information  
  5. Attempts to gain unauthorised access to computer systems, e.g. hacking 
  6. Records altered or deleted without authorisation by the data ‘owner’ 
  7. Viruses or other security attacks on IT equipment systems or networks 
  8. Breaches of physical security, e.g. forcing of doors or windows into a secure room or filing cabinet containing personal data
  9. Personal data viewable in accessible areas
  10. Leaving IT equipment unattended when logged in to a user account without locking the screen to stop others accessing information
  11. Emails containing personal or special category data sent in error to the wrong recipient 

Part B - Identification and Initial Assessment of a Suspected Breach of Personal Data

Identification and Notification of Suspected Personal Data Security Breach 

(7) Any individual who suspects that a personal data security breach has occurred, whether they have caused, been subject to or identified a breach of personal data, are required to: 

(8) Immediately upon becoming aware of the breach, notify the Records and Data Manager at dpo@hiberniacollege.net, who will advise them on any required steps that need to be taken

(9) Notify their line manager (where applicable) without delay

(10) Complete the Personal Data Security Breach Report Form, available under the resources section of the Hibernia College Quality Framework, and forward to the Records and Data Manager as soon as possible 

Initial Assessment

(11) The Records and Data Manager conducts an initial assessment as a matter of priority within 24 hours upon receipt of a notification, which will include a review of: 

  1. The nature of the personal data involved in the breach (i.e. whether special category data is involved)
  2. The cause of the breach
  3. The extent of the breach (i.e. the number of data subjects affected)
  4. The potential harm to which the affected data subjects may be exposed
  5. Any steps that may be taken to contain the breach
  6. Determining if any other College stakeholders need to be informed of the incident

Outcome of Initial Assessment

(12) Where the outcome of an initial assessment confirms that a personal data breach has not occurred, the process concludes, and the Records and Data Manager notifies the reporter that no data breach has occurred.

(13) Where the outcome of an initial assessment confirms that a personal data security breach has occurred, the Records and Data Manager will immediately proceed to coordinate the College response, as follows.

Part C - Managing a Confirmed Personal Data Security Breach

Containment and Recovery

(14) In the event of a confirmed personal data security breach, immediate and appropriate steps must be taken to limit the extent of the breach. The Records and Data Manager, in consultation with any relevant College Staff, will:

  1. Identify Staff members within the College who need to be aware of the breach and inform them of their expected role in containing the breach
  2. Establish and implement measures to ameliorate the damage caused by the breach in conjunction with relevant Staff members
  3. Inform the College Executive Management Team
  4. Inform any outside agencies concerned, e.g. schools or hospitals, as appropriate
  5. Undertake a risk assessment to consider the potential adverse consequences for the affected data subjects, including how likely such adverse consequences are to materialise and how serious or substantial they are likely to be
  6. Assess the risks for the College to include strategic, operational, legal, financial and reputational risks, as appropriate
  7. Where appropriate, inform the Gardaí (in cases involving criminal activity)

Risk Assessment

(15) As is set out above, where a personal data security breach is confirmed, the Records and Data Manager in conjunction with relevant College Staff, will conduct a risk assessment to assess the potential adverse consequences for the affected data subjects. The assessment will consider the likelihood of the risks taking place and the severity of such risks and will consider the following criteria:

  1. Type of breach
  2. Nature of the personal data
  3. Scale and volume of the personal data affected
  4. Ease of identification of the affected data subjects
  5. Security measures in place
  6. Containment measures
  7. Severity of the risk
  8. Likelihood of the risk(s) materialising 

Notification of the Data Subject

(16) Where the personal data security breach is likely to result in a high risk to the rights and freedoms of the data subject, the College will inform the affected data subjects, without undue delay. 

(17) Where it is necessary to notify the data subject, the Records and Data Manager will communicate the details of the data breach to the data subject(s) to include the:

  1. Name and contact details of the Records and Data Manager or other contact point where more information can be obtained
  2. Likely consequences of the personal data security breach
  3. Measures taken, or proposed to be taken, by the controller to address the personal data security breach, including, where appropriate, measures to mitigate its possible adverse effects

Notification of the Data Protection Commissioner

(18) Where the College has determined that the personal data security breach is likely to result in a risk to the rights and freedoms of data subjects, the Records and Data Manager will notify the Data Protection Commission without undue delay, and no later than 72 hours, after becoming aware of the breach. If, for any reason, the breach cannot be notified to the Data Protection Commission within 72 hours, the notification will be accompanied by reasons for the delay. 

(19) The notification will include the nature of the personal data security breach, including the: 

  1. Categories and approximate number of data subjects concerned
  2. Categories and approximate number of personal data records concerned
  3. Name and contact details of the Data Protection Officer or other contact point where more information can be obtained
  4. Likely consequences of the personal data security breach
  5. Measures taken, or proposed to be taken, by the College to address the personal data security breach, including, where appropriate, measures to mitigate its possible adverse effects

Evaluation and Response

(20) The Records and Data Manager retains all records of the incident.

(21) The Records and Data Manager, in consultation with all relevant stakeholders, will conduct a review of the incident to:

  1. Ensure the steps taken during the incident were appropriate and effective
  2. Identify any areas for improvement

(22) The review report is issued to all relevant departments.

(23) A post-incident review will be conducted to ensure that the steps taken during the incident were appropriate and effective and to identify any areas which may need to be improved in future to avoid any recurrence.