← Back to Policies

Data Breach Response Plan

Emergency Response & Incident Management

Plan Information

Plan Owner: Data Protection Officer

Effective Date: [INSERT DATE]

Review Date: [ANNUAL REVIEW]

Version: 1.0

24/7 Emergency Contact: [DPO EMERGENCY NUMBER]

🚨 EMERGENCY BREACH REPORTING

If you discover or suspect a data breach:

IMMEDIATELY contact the Data Protection Officer:

📞 Emergency: [DPO EMERGENCY NUMBER] (24/7)
📧 Email: dpo@clearmindseap.com
📧 Backup: [BACKUP CONTACT EMAIL]

Do NOT delay reporting - we have strict legal timeframes to report to the ICO (within 72 hours)

1. Introduction and Purpose

This Data Breach Response Plan establishes ClearMinds' procedures for identifying, assessing, responding to, and recovering from personal data breaches in compliance with UK GDPR and the Data Protection Act 2018.

A personal data breach can have serious consequences for affected individuals and for ClearMinds. This plan ensures we respond quickly, effectively, and in compliance with legal requirements, particularly the 72-hour notification requirement to the ICO.

1.1 What is a Data Breach?

Under UK GDPR Article 4(12), a personal data breach means:

"A breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data transmitted, stored or otherwise processed."

1.2 Types of Data Breaches

Examples of Data Breaches:

  • Email sent to wrong recipient containing personal data
  • Loss or theft of device containing personal data
  • Ransomware attack encrypting clinical records
  • Unauthorised access to systems by hacker
  • Staff member accessing records without authorisation
  • Accidental publication of personal data on website
  • Physical records left in insecure location
  • Backup tapes lost or stolen

2. Data Breach Response Team

2.1 Core Response Team

Role Name Contact Responsibilities
Data Protection Officer (Lead) [DPO NAME] [DPO CONTACT] Overall incident management, ICO liaison, regulatory compliance
IT Security Lead [IT LEAD NAME] [IT CONTACT] Technical investigation, containment, system security
Clinical Director [CLINICAL DIRECTOR NAME] [CLINICAL CONTACT] Clinical impact assessment, patient safety, clinical communications
Legal Counsel [LEGAL NAME / FIRM] [LEGAL CONTACT] Legal advice, liability assessment, regulatory response
Communications Lead [COMMS LEAD NAME] [COMMS CONTACT] Internal/external communications, media liaison
Senior Management [CEO/MD NAME] [MANAGEMENT CONTACT] Strategic decisions, board liaison, resource approval

2.2 Extended Team (as needed)

3. Breach Response Timeline

Critical Timeframes (UK GDPR Requirements)

  • 0-24 hours: Detection, containment, initial assessment, mobilise response team
  • Within 72 hours: Report to ICO (if required) - Article 33 UK GDPR
  • Without undue delay: Notify affected data subjects (if high risk) - Article 34 UK GDPR
  • Within 30 days: Complete full investigation and implement remedial actions
⚠️ Critical Requirement: If we cannot report to the ICO within 72 hours, we must provide reasons for the delay and submit the report as soon as possible thereafter. Delays must be justified and documented.

4. Phase 1: Detection and Initial Response (0-2 hours)

4.1 Breach Detection

Breaches may be detected through:

4.2 Immediate Actions (First Person Discovering Breach)

✅ Immediate Actions Checklist

  1. STOP and CONTAIN: Immediately stop any ongoing breach activity if safe to do so
  2. PRESERVE EVIDENCE: Do not delete, alter, or destroy any evidence. Take screenshots if appropriate
  3. REPORT IMMEDIATELY: Contact DPO via emergency number [NUMBER] or email dpo@clearmindseap.com
  4. DO NOT DISCUSS: Do not discuss the breach with anyone except the DPO or response team
  5. DOCUMENT: Write down exactly what happened, when, and what you observed
  6. SECURE AREA: If physical breach, secure the location and prevent access

4.3 DPO Initial Assessment (Within 1 hour)

Upon notification, the DPO will:

  1. Confirm breach details and severity
  2. Activate the Data Breach Response Team
  3. Assign incident reference number
  4. Open incident log and begin documentation
  5. Initiate immediate containment measures
  6. Determine if 72-hour clock has started (when organisation became aware)
  7. Notify senior management

5. Phase 2: Containment and Assessment (2-24 hours)

5.1 Immediate Containment

IT Security Lead Actions:

5.2 Breach Assessment

The response team must assess:

Nature of the Breach

Scope and Impact

Risks to Individuals

5.3 Risk Severity Assessment

Risk Level Characteristics ICO Report? Data Subject Notification?
LOW Minimal or no risk to individuals. Quick containment. No sensitive data. Internal breach with recovery. NO (but log internally) NO
MEDIUM Some risk to individuals. Limited scope. Non-sensitive data or encrypted. Unlikely to cause significant harm. YES (within 72 hours) ASSESS (if risk mitigated, may not be required)
HIGH Significant risk. Large-scale breach. Sensitive/special category data. Potential for serious harm (identity theft, discrimination, psychological harm). YES (within 72 hours) YES (without undue delay)
CRITICAL Severe risk. Mass breach of health data. Children involved. High likelihood of serious harm. Media attention likely. YES (URGENT - within 72 hours) YES (URGENT - without undue delay)

6. Phase 3: Notification and Communication (24-72 hours)

6.1 ICO Notification (Article 33 UK GDPR)

When to Notify: Within 72 hours of becoming aware of a breach likely to result in a risk to individuals' rights and freedoms.

How to Notify: Via the ICO's online breach reporting tool at https://ico.org.uk/for-organisations/report-a-breach/

Information to Include in ICO Report:

  1. Description of the breach: Nature of the breach, categories and approximate numbers of data subjects and records affected
  2. Contact details: Name and contact details of the DPO or other contact point
  3. Likely consequences: Description of the likely consequences of the breach
  4. Measures taken: Description of measures taken or proposed to address the breach, including mitigation of possible adverse effects
Phased Reporting: If we cannot provide all information within 72 hours, we can submit an initial report and provide additional information in phases, explaining reasons for the delay.

6.2 Data Subject Notification (Article 34 UK GDPR)

When to Notify: Without undue delay if the breach is likely to result in a HIGH RISK to individuals' rights and freedoms.

Exceptions (when notification NOT required):

Content of Data Subject Notifications:

Notification Methods:

6.3 Internal Communication

6.4 External Communication

7. Phase 4: Investigation and Recovery (3-30 days)

7.1 Detailed Investigation

Conduct thorough investigation to determine:

7.2 Forensic Analysis

For serious incidents, consider engaging:

7.3 Recovery Actions

7.4 Disciplinary Action

If breach resulted from staff misconduct or negligence:

8. Phase 5: Post-Incident Review and Improvement (30+ days)

8.1 Comprehensive Review

Within 30 days of breach resolution, conduct full post-incident review:

8.2 Corrective and Preventive Actions

8.3 Action Plan

Create action plan with:

8.4 Documentation and Reporting

9. Breach Documentation Requirements

ClearMinds maintains a comprehensive breach log documenting all breaches, regardless of whether ICO notification was required.

9.1 Breach Log Contents

For each breach, document:

9.2 Retention

Breach records retained for 7 years from breach date for accountability and ICO audit purposes.

10. Special Scenarios

10.1 Processor Breaches

If a processor experiences a breach affecting ClearMinds data:

10.2 Ransomware Attacks

Ransomware is both an availability breach and often a confidentiality breach:

10.3 Insider Threats

Breaches caused by malicious or negligent insiders:

10.4 Physical Breaches

Loss or theft of devices or physical records:

11. Training and Awareness

12. Testing and Review

13. Related Documents