The response plan that FMI Works follows should any customer data be compromised either intentionally or unintentionally
This article is for IT and security professionals
This data breach response plan (the response plan) sets out procedures and clear lines of authority for FMI staff in the event that FMI experiences a data breach (or suspects that a data breach has occurred). A data breach occurs when personal information is lost or subjected to unauthorised access, modification, use or disclosure or other misuse. Data breaches can be caused or exacerbated by a variety of factors, affect different types of personal information and give rise to a range of actual or potential harms to individuals, agencies and organisations.
FMI experiences data breach/data breach suspected
FMI staff response
- Are multiple individuals affected by the breach or suspected breach?
- Is there (or may there be) a real risk of serious harm to the affected individual(s)?
- Does the breach or suspected breach indicate a systemic problem in FMI processes or procedures?
- Could there be media or stakeholder attention as a result of the breach or suspected breach?
- Immediately notify a member of the Data Breach Response Team (Line Manager, CTO, or COO) of the suspected data breach.
- Record and advise the time and date the suspected breach was discovered, the type of information involved, the cause and extent of the breach, and the context of the affected information and the breach.
FMI escalation response
- Confirm whether a data breach has or may have occurred.
- Determine whether the data breach is serious enough to escalate to the wider Data Breach Response Team (some breaches may be able to be dealt with by single response team members).
- If necessary, immediately notify the remainder of the Data Breach Response Team.
Minor priority breach process
If a Manager decides not to escalate a minor data breach or suspected data breach to the response team for further action, the Manager will collect and document for the response team Coordinator the following information:
- Description of the breach or suspected breach,
- action taken by the Manager or response team officer to address the breach or suspected breach,
- the outcome of that action, and
- the Manager's view that no further action is required
Escalated priority breach process
- Contain the breach and do a preliminary assessment
- Evaluate the risks associated with the breach
- Notification of affected parties
- Prevention of future breaches
Other Incident Responses
Most incidents, issues and problems that occur during the operation of the FMI Works system do not trigger our reporting requirements. For example, a DDoS attack on our servers that is automatically handled by our auto-detection system. However, from time to time these incidents may be deemed noteworthy and will be reported to customers even though they don't trigger the above conditions. The 2021 Log4J vulnerability - which didn't affect our systems - was important enough that we drafted a statement for customers. These additional reports might be sent through e-mail or made public in our Security Updates section.