Sign Up

What is 8 + 4?

Have an account? Sign In Now

Sign In

What is 8 + 4?

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

What is 8 + 4?

Have an account? Sign In Now

Please type your username.

Please type your E-Mail.

Please choose an appropriate title for the question so it can be answered easily.
Please choose the appropriate section so the question can be searched easily.

Type the description thoroughly and in details.

What is 8 + 4?

Sign InSign Up

Watercooler by DPOrganizer

Watercooler by DPOrganizer Logo Watercooler by DPOrganizer Logo

Watercooler by DPOrganizer Navigation

Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Categories
    • GDPR
    • Privacy Management
    • Professional Development
    • Software tips and tricks
    • Polls
  • Help
  • About Watercooler
Home/ Questions/Q 5761
Next
In Process
Bgibbon
Bgibbon

Bgibbon

  • 4 Questions
  • 3 Answers
  • 0 Best Answers
  • 2 Points
View Profile
  • 0
Asked: April 6, 20212021-04-06T17:04:12+01:00 2021-04-06T17:04:12+01:00In: GDPR, Privacy Management

Lost laptops and other devices

  • 0

Our company encrypts all of our company laptops. If someone loses a laptop, and it was locked at the time, is this considered a data breach, do we need to report this to the ICO? WE are looking at preventing users from downloading information onto the C drive of the laptop to prevent a data loss, but wonder if an encrypted and locked laptop or phone would indeed be a reportable data breach.

  • 4 4 Answers
  • 0 Followers
  • 0
Answer
Share
  • Facebook

    4 Answers

    • Voted
    • Oldest
    • Recent
    1. HellenB

      HellenB

      • 2 Questions
      • 83 Answers
      • 0 Best Answers
      • 79 Points
      View Profile
      HellenB Silver contributor
      2021-04-07T13:22:46+01:00Added an answer on April 7, 2021 at 1:22 pm

      In considering this it shines a light on what data an individual is storing onto the device and if, you as an organisation, permit this what policies you have in place.
      It is worth having a look at the data flow in your working processes to discover whether anything needs to leave the systems they are in, and where you spot that this is happening to either redesign the system or nip the behaviour in the bud.
      One example is where a marketing team may export data from a CRM (equivalent) to import it into EMS (e.g. Mailchimp) and retain a local copy. It might be worth weaning them off the separate system and using one which either has a direct API or an integrated platform.

      • 0
      • Reply
      • Share
        Share
        • Share on Facebook
        • Share on Twitter
        • Share on LinkedIn
    2. Stephen Lark

      Stephen Lark

      • 2 Questions
      • 29 Answers
      • 0 Best Answers
      • 26 Points
      View Profile
      Stephen Lark Bronze contributor
      2021-04-07T08:56:02+01:00Added an answer on April 7, 2021 at 8:56 am

      If the data is unreadable then it is not a data breach – it is why encryption is such a good tool.
      I would recommend you have good key management in place….and good password management. If the users password is easily cracked then you are wasting your time encrypting the data.

      In this case I would not report this as a breach.

      • 0
      • Reply
      • Share
        Share
        • Share on Facebook
        • Share on Twitter
        • Share on LinkedIn
    3. Simon

      Simon

      • 1 Question
      • 18 Answers
      • 0 Best Answers
      • 19 Points
      View Profile
      Simon Bronze contributor
      2021-04-07T08:36:04+01:00Added an answer on April 7, 2021 at 8:36 am

      Great reason to buy Windows Business or Pro licenses, they come with BitLocker which will encrypt the hard drive and make it really quite difficult to access data stored there. Similarly InTune is a great tool for remote wiping if the laptop does get turned on by a thief. For larger organisations little data should be on the physical machine, but stored on cloud solutions (Azure, AWS), or on organisation’s file servers.

      I’ve dealt with several incidents relating to missing devices – they almost always were found once employees had properly looked for them. It’s difficult to assess the risk to individuals because you don’t know what data was on the device, you can try and find a like for like for the purposes of comparison. For stolen devices I’ve considered the risk to the individual, and usually felt that due to the mitigations (encryption, strong password policies (actually enforced), use of file servers and/or cloud for data storage) the risk to individuals was low.

      • 0
      • Reply
      • Share
        Share
        • Share on Facebook
        • Share on Twitter
        • Share on LinkedIn
    4. Figaro

      Figaro

      • 3 Questions
      • 17 Answers
      • 0 Best Answers
      • 14 Points
      View Profile
      Figaro Bronze contributor
      2021-04-06T23:42:28+01:00Added an answer on April 6, 2021 at 11:42 pm

      It is indeed an incident, and most likely an internal breach.

      However, the threshold for an ICO notification is on the element of risk to the individuals whose data was on the laptop that was lost.

      See what mitigations were in place (encryption is one), what steps you’ve taken immediately, and also what types of data would possibly be accessible through that laptop and how much.

      Look at all that and answer the question: Does this loss create an actual risk to the rights and freedoms of the individual?

      If yes, you must notify.

      https://gdpr-info.eu/art-33-gdpr/
      “[you must notify] unless the personal data breach is unlikely to result in a risk to the rights and freedoms of natural persons”

      Of course, you will also document the event, etc. Breach or no breach, notification or no notification. that’ll help you spot patterns, should certain types of incidents have a tendency to happen in certain areas…

      • 0
      • Reply
      • Share
        Share
        • Share on Facebook
        • Share on Twitter
        • Share on LinkedIn

    Leave an answer
    Cancel reply

    You must login to add an answer.

    What is 8 + 4?

    Forgot Password?

    Sidebar

    Ask A Question

    Trending contributors

    Smurf333

    Smurf333

    • 11 Answers
    Bronze contributor
    Dave_Wylie

    Dave_Wylie

    • 28 Answers
    Bronze contributor
    CRodica

    CRodica

    • 6 Answers
    Rising star contributor
    Atis

    Atis

    • 4 Answers
    Ian G

    Ian G

    • 5 Answers
    Rising star contributor

    Recent questions

    • Ian G

      Revoke.com - new third party portal for customer right requests

      • 0 Answers
    • Anonymous

      Instagram!!

      • 0 Answers
    • Olga

      DPO in EU and UK

      • 1 Answer
    • Smurf333

      DBS scenario with HR retaining excessive information for longer than ...

      • 0 Answers
    • CRodica

      Parties role towards employees data for administrative purposes

      • 0 Answers

    Explore

    • Home
    • Categories
      • GDPR
      • Privacy Management
      • Professional Development
      • Software tips and tricks
      • Polls
    • Help
    • About Watercooler

    Footer

    Your privacy

    • Cookie notice
    • Privacy notice

    Terms and policy

    • Acceptable Use Policy
    • Terms of Use

    © 2021 DPOrganizer. All Rights Reserved. With Love by DPOrganizer.