1. Detection | Identify potential data breach in published open data | Any staff member can report | Immediate |
Document when and how the incident was discovered | Data Publisher | Immediate |
Secure evidence of the breach | Data Custodian | Immediate |
2. Containment | Remove affected dataset from public access | Data Publisher (primary) | Within 2 hours of detection |
Disable APIs or data services if necessary | Business System Owner | Within 2 hours of detection |
Document what data was compromised | Data Custodian | Within 2 hours of detection |
Preserve evidence for investigation | Data Custodian | Within 2 hours of detection |
3. Internal Reporting | Notify Chief Data Officer | Data Custodian | Within 4 hours of detection |
Report to agency privacy officer | Data Custodian | Within 4 hours of detection |
Engage cyber security team if relevant | Data Custodian | Within 4 hours of detection |
Activate agency data breach response team | Data Custodian | Within 4 hours of detection |
4. Risk Assessment | Identify type of information exposed | Data Custodian | Within 24 hours of detection |
Determine if personal or sensitive information was released | Legal Advisor | Within 24 hours of detection |
Assess potential for harm | Subject Matter Expert | Within 24 hours of detection |
Determine if incident qualifies as an 'eligible data breach' under MNDB Scheme | Cyber Security Advisor | Within 24 hours of detection |
5. External Notification | Notify Privacy Commissioner (if required under MNDB Scheme) | Chief Data Officer | Within timeframes specified by MNDB Scheme (typically within 30 days of becoming aware) |
Notify affected individuals (if required) | Chief Data Officer | Within timeframes specified by MNDB Scheme (typically within 30 days of becoming aware) |
Consider notification to other relevant authorities | Subject Matter Expert | Within timeframes specified by MNDB Scheme (typically within 30 days of becoming aware) |
6. Remediation | Correct the dataset | Chief Data Officer | Before republication |
Apply additional safeguards | Subject Matter Expert | Before republication |
Consider alternative publication methods | Data Custodian | Before republication |
Review and approve corrected data | Chief Data Officer | Before republication |
7. Republication | Republish corrected dataset | Data Publisher | After approval of remediated data |
Document changes made | Data Custodian | After approval of remediated data |
Update metadata and documentation | Data Custodian | After approval of remediated data |
8. Post-Incident Review | Conduct root cause analysis | Data Custodian | Within 14 days of resolution |
Document lessons learned | Subject Matter Expert | Within 14 days of resolution |
Update procedures to prevent recurrence | Business System Owner | Within 14 days of resolution |
Report to Chief Data Officer | Data Custodian | Within 14 days of resolution |