The most recent European Data Protection Board (EDPB) Guidelines aim at helping data controllers decide how to handle data breaches and what factors to consider during risk assessment. The EDPB guidelines have been updated post public consultation and thus adopt a case study based approach, so they appear as a practical tool to be considered in conjunction with the existing Guidelines WP250. The guidelines cover various causes for breaches such as ransomware attacks, data exfiltration attacks, social engineering, and different scenarios related to the occurrence of an human error.
An IBM report in 2021 on data breaches concluded that 95 % of data breaches are caused by human error. The purpose of this report is to consider the guidelines issued by the EDPB on human error as a cause for breaches. The article will be focused on the data breaches potentially related to human error and then consider the case studies discussed by the EDPB guidelines before suggesting recommendations to mitigate the risks arising from human errors.
Human error is usually an unintentional action or inaction on the part of the employees that trigger, spread or permit a data breach to take place. A few examples of breaches caused by human error could be something as simple as an employee:
- Clicking on a suspicious link in an email, leading to malware being downloaded onto the system;
- Sending an email/ letter with personal data to an unintended recipient;
- Sharing screen during a meeting call with unrelated personal data visible on the screen;
- Leaving files and documents with confidential and personal data unattended at a workstation or near a photocopier;
- Responding to a call without verification and disclosing personal data;
- Having the same password for multiple accounts;
- Forgetting/ losing an unencrypted work-related device.
It is apparent from the above examples that the simplicity of how these types of breaches occur contributes to the difficulty that data controllers face to identify vulnerabilities and adopt measures to avoid them. However, the following section gathers some examples of possible scenarios that can be considered to help organisations to adopt a proactive approach to mitigate breaches that result from a human error.
Case-Studies:
Case 1:
Facts | Risk Assessment and Mitigating Actions | Notification Obligations |
An employee copies data from the organisation’s database to a personal device.
After resigning, the employee uses the data to contact the clients to entice them for his new business. | Risks:
Mitigation:
| A notification to the Supervisory Authority will be needed .
It is necessary to document the incident in a breach register per Article 33 (5) of the GDPR.
As the impact on the data subjects is minimal at the first instance, a notification to individual data subjects may not be necessary. |
Case 2:
Facts | Risk Assessment and Mitigating Actions | Notification Obligations |
An employee/agent/processor accidentally sends data to a trusted but unintended recipient. | Risk
Mitigation:
| If the unintended recipient is trusted and immediately deletes data and provides confirmation, neither a notification to supervisory authority nor the data subjects could be needed.
It is necessary to document the incident in a breach register per Article 33 (5) of the GDPR.
|
Case 3:
Facts | Risk Assessment and Mitigating Actions | Notification Obligations |
Two letters were mixed up, resulting in both letters being sent to the wrong person.
This means that the two data subjects got access to each other’s information. | Risk:
Mitigation:
| If no sensitive data is involved and the content may not cause substantial negative impact, then merely internal documentation of the incident in the breach register will suffice per Article 33 (5) of GDPR.
If sensitive data is involved, data subjects will have to be formally contacted per Article 34 of GDPR, and the Supervisory Authority will have to be notified.
|
Organisational and technical measures for preventing/mitigating the impacts of breaches resulting from human error:
As stated earlier, it is challenging to draft static recommendations to counter data breaches resulting from human error. Therefore, we recommend a combination of measures to be adopted and adapted accordingly, based on the unique features of each case. Examples of such potential measures include the following:
Training and Awareness:
- Provide adequate training for employees on how to send letters and emails and the data protection risks related to these actions.
- Develop a privacy culture by organising regular awareness sessions focused on avoiding the most common mistakes leading to personal data breaches.
- Draft and circulate manuals on handling incidents and data breaches with up-to-date information on who to inform if an incident/data breach occurs.
Emails:
- Instruct employees sending emails with multiple recipients to use the bcc’ (blind carbon copy) function by default.
- Implement the message delay function (e.g. the message can be deleted/edited within a specific time period after clicking the press button).
- Disable the autocomplete function when typing in email addresses.
- Implement policies forbidding and preventing access to known open mail services.
- Avoid sharing sensitive data through emails; instead, use a secure file sharing mechanism. However, when sharing attachments containing personal data, please use password tools to protect the files.
Access Management
- Adopt access control policies and implement them strictly.
- Make multifactor user authentication mandatory when accessing sensitive personal data.
- Curb the malicious use of data, by disabling the employee’s company-related account as soon as the person leaves the company.
- Track unusual data flow between the file server and employee workstations.
- Apply technical measures to block external storage devices on company-owned devices.
- Disable the print screen function on the operating systems.
- Implement a clean desk policy to mitigate any unintentional risks from an unattended workstation.
- Use the automated locking function available on all computers.
Data breaches are complex problems in themselves, but they may also be symptoms of a vulnerable, possibly outdated, security regime. Therefore, it is necessary to keep policies up-to-date, report data breaches and develop a privacy culture through regular training and awareness activities. Lastly, if anything goes wrong when processing personal data, don’t panic! Follow the data breach reporting procedure or get in touch with your line manager and the data protection officer as quickly as possible: it is important to remember that data breaches have to be managed and reported within 72 hours, where necessary.
Trilateral’s Data Governance and Cyber Risk Team have data protection specialists with extensive expertise and experience in implementing appropriate security measures in respect of personal data across both public and private sector organisations. Our support services will help your organisation protect patient records and maintain trust. Please feel free to contact our advisors, who would be more than happy to help.