Introduction
Data breach notification requirements are receiving more and more attention in the European Union. Recently, an obligation to notify data breaches was introduced by the revised EU e-Privacy Directive (2002/58/EC),
The European Commission has also proposed in its draft regulation on the processing of personal data (the “Regulation”)
In France, the provisions of the e-Privacy Directive regarding data breach notification were implemented by an Ordinance
In light of these new provisions, the guidance issued by the CNIL, and the upcoming changes under the Regulation, now seems a good time for companies to assess their level of compliance with regard to data breaches and to begin implementing appropriate measures and procedures.
General Data Security Obligations for All Data Controllers
As a general rule, data controllers must comply with the data security requirements under Article 34 of the French Data Protection Act that apply to any data processing activity. Data controllers must take all necessary measures to preserve the security of personal data, taking into account the nature of the data and the risks of the processing. In particular, these measures must be taken to prevent alteration of, or damage to, the data or their access by unauthorised third parties. Non-compliance with these provisions is punishable by five years of imprisonment and a fine of up to €300,000 (U.S.$368,729).
These security measures equally apply to data processors, who must offer adequate guarantees to ensure the security and confidentiality of the data they process. Data controllers must verify that their processors provide such guarantees, which is why an agreement must be signed between the data controller and the data processor, imposing on the data processor an obligation to implement adequate security measures when processing personal data on behalf of a data controller.
The CNIL has also released several guidebooks aimed at assisting companies to implement adequate security measures. In October 2010, the CNIL released a first security handbook (Guide sur la sécurité des données personnelles),
In particular, with regard to data security breaches, the CNIL considers that companies should have an operational structure enabling them to detect and mitigate incidents that are likely to affect the privacy rights of data subjects. To this end, organisations should:
- define roles and responsibilities within the organisation and establish internal procedures for dealing with data breaches;
- create an inventory of individuals responsible for handling data breaches;
- develop a response plan for data breaches, which must be regularly updated and tested;
- measure the seriousness of data breaches and categorise them according to their impact on the privacy of individuals;
- respond to data breaches according to their degree of seriousness;
- maintain an inventory of data breaches describing the type of breach, its consequences and remediation measures; and
- analyse how to improve security measures after a data breach has occurred.
Specific Data Breach Notification Obligation for Electronic Communications Service Providers
The provisions regarding data breaches under Article 34 bis of the Data Protection Act have a limited scope. They apply only to electronic communications service providers (“service providers”), meaning companies that are registered with the French telecommunications regulator, ARCEP,
Article 34 bis defines a breach as “any destruction, loss, alteration, disclosure or unauthorised access to personal data that is accidental, illicit, malicious in intent or otherwise.” According to the CNIL, certain types of “intrusion” would not be classified as a breach under the requirements (e.g., a virus that attacks the computers of subscribers to a particular ISP or a breach affecting the service provider’s human resources database). On the other hand, unlawful access to the service provider’s customer database, or a breach in the service provider’s online store exposing customer bank card details, would qualify as a breach. The CNIL specifies that the new law covers “material” breaches, for example, the loss of a paper contract in a mobile telephone operator’s shop (where individuals purchase phones and sign up for the service), as well as electronic breaches, such as unauthorised access to a client database.
Service providers are subject to two types of notification requirements:
- notification to the CNIL, and
- in some cases, notification to the users or subscribers affected by the breach.
Notification to the CNIL
In the event of a breach, service providers must notify the CNIL of the breach without delay. The law does not specify any threshold for notification and, thus, all breaches must be notified to the CNIL to the extent that the breach 1) involves personal data; 2) concerns an electronic communications service provider; and 3) occurs within the context of the provision of services. The CNIL’s guidance does not specify what is meant by “without delay,” but this notion is usually interpreted by the CNIL to mean “immediately.”
Notification to the CNIL must be carried out by sending a letter via registered mail detailing 1) the nature and consequences of the breach; 2) the measures taken or planned to remedy the breach; 3) a contact person who may provide additional information; and 4) if possible, an estimate of the number of individuals affected by the breach. The law does not require this letter to have any particular form, and the CNIL has not issued any specific model. Therefore, companies are free to use their own models as long as the letter contains the legally required content.
Notification to Individuals
If the breach is likely to affect the personal data and privacy rights of subscribers or other individuals, the service provider must also notify the affected individuals. The law does not explain in more detail when to notify individuals, and it is therefore up to the service provider to analyse the consequences of a breach for the individuals concerned and to assess its seriousness. For example, a breach affecting the service provider’s customer database or the customer invoicing details would require informing the individuals.
Notice must be provided to the individuals affected by a breach without delay and by any means available that enable the service provider to preserve evidence that it gave notice. The notification must inform the individuals about: 1) the nature of the breach, 2) the contact person from whom they may request additional information and 3) the measures recommended by the service provider in order to limit the negative impact of the breach. Once again, the law does not require any particular form for this notice. Therefore, notice may be provided by email, postal mail or possibly even by short message service (“SMS”).
Notification to the individuals affected by a breach is not required where the service provider has implemented “appropriate protection measures” to the personal data involved in the breach.
Appropriate Protection Measures
Appropriate protection measures are defined by the law as any measures that have been rendered “undecipherable” or “unintelligible” to unauthorised persons and have been applied to the data affected by the breach. Depending on the type of breach and its seriousness, the service provider must assess whether to implement protection measures, bearing in mind that, if it does not notify the individuals concerned, it must then inform the CNIL about the protection measures that it has implemented. The CNIL will then review those protection measures and decide whether they are valid given the circumstances of the breach.
The CNIL states that “all technically effective measures” that serve the purpose of rendering personal data unintelligible can be used, but notes that, if data are encoded or encrypted and the key to the code is also accessed or lost in the course of the breach, the exemption would not apply. In practice, the CNIL recommends that the service provider inform the CNIL about the protection measures being used at the same time it provides notice of the breach.
The information regarding the protection measures must specify:
- the last name, first name, address and telephone details of the data controller;
- a description of the protection measures;
- the measures applied to guarantee the efficiency of those protection measures;
- if applicable, reference to the registration filed with the CNIL prior to implementing the data processing activity in question; and
- whether the individuals concerned have been notified and, if not, the reasons justifying the absence of such notification.
Once the notice is received, the CNIL has two months to analyse and pronounce on the validity of the protection measures in relation to the seriousness of the breach. If the CNIL confirms that the action taken is sufficient, then the service provider is not required to inform the individuals. In case of non-response from the CNIL within two months, the service provider must then notify the affected individuals. After investigating the severity of the breach, if the CNIL considers that the protection measures are insufficient with regard to the seriousness of the breach, it may issue a formal notice requesting that the service provider inform the individuals affected within one month (unless the service provider has already done so).
After a breach has occurred, service providers must maintain and update a register of security incidents, recording information on the breach, its consequences, and the measures taken to remedy the breach. Such register may be kept in paper or electronic format and must be kept available to the CNIL at any time.
Sanctions and Enforcement
The failure to comply with the notification requirements is punishable by imprisonment for up to five years and a maximum fine of up to €300,000 (U.S.$368,729).
The CNIL announced in its 2012 audit programme that, among other things, it will enforce the new legal requirement for electronic communications operators to report data breaches to affected individuals.
Future Developments within the European Union
At an EU level, several initiatives indicate that the data breach notification requirement could soon be extended across all business sectors. In July 2011, the European Parliament approved a resolution
One of the most significant developments for data breaches is the proposal for a Regulation on the processing of personal data that was released by the European Commission at the beginning of 2012. The proposed Regulation would introduce a broad notification requirement for any personal data breach similar to that set out in the amended e-Privacy Directive. Data controllers would be required to notify the local data protection authority of any breach of security without undue delay and no later than 24 hours after the controller became aware of the breach. A delay in notification would be possible, but the controller would have to make a reasoned justification for taking longer than 24 hours to notify. If the breach was likely to adversely affect the protection of an individual’s personal data or privacy, the controller would also have to notify each individual concerned. Notification to the individuals would not be required where the organisation could demonstrate that it applied appropriate protection measures to protect the data. Failure to report a breach would be sanctioned by administrative penalties of up to 2 percent of an organisation’s annual global turnover.
Before the proposed Regulation becomes EU law, both the European Parliament and the Council of the European Union (“Council”) must jointly agree on the final text in the “co-legislation procedure.” During the co-decision procedure, the European Parliament and the Council must review the draft Regulation, may propose amendments, and must come to an agreement before passing the legislation. On June 22, 2012, the Council issued a formal note providing a detailed overview of the EU Member States’ discussions to date on the proposed Regulation. In particular, the Council noted the broad scope of personal data breaches. The duty to notify breaches was questioned by some Member States that thought this could lead to over-notification, while others supported a broader definition that would cover each and every incident. The Commission clarified that its aim is to have a provision similar as in the e-Privacy Directive. The Parliament is understood to be drafting a first Working Document, and aims to present its Opinion in the summer of 2013.
Practical Steps Towards Compliance
The difficulty for companies to comply with data breach notification requirements is that data breaches have no borders and often affect individuals in multiple jurisdictions. In view of the variety of legal regimes in the European Union and elsewhere, it is advisable that organisations draft an internal incident response plan. When a breach occurs, a response plan serves as a reference guide for best practices in dealing with the breach, as well as how to identify and comply with the relevant legal requirements.
Set out below are the different steps that organisations may follow when creating their own response plans.
Before a Breach Occurs
Companies should take reasonable measures to prevent data breaches. Below are some of the preventive measures that may limit the risk of a breach:
- Develop an Information Security Policy
Before any breach occurs, the organisation may consider developing a comprehensive information policy. Drafting of the internal information policy should begin with identifying what types of breaches may occur. The definition of a breach incident should be as broad as possible and should encompass any situation in which the confidentiality of internal information may have been compromised (e.g., disclosed to, accepted by, or acquired by someone who is not authorised to access or receive the information) or is at risk of being compromised. The policy should also identify the types of data that may be lost (e.g., identification data, financial data, health data, sensitive data, etc.) and the categories of individuals who may be affected (e.g., customers, employees, etc.).
- Identify Possible Risks
There are numerous risks of a breach that each organisation should identify. This will usually depend on the field of operation. The types of risks to consider when evaluating and implementing security measures may include:
- collection of information over the internet;
- access to sensitive files by employees and independent contractors;
- use of security controls by employees;
- transmission, storage, and disposal of computerised data;
- outsourcing transactions that require transmission of data;
- insufficient physical security of the premises; or
- risk of unauthorised access.
Employees should be trained regarding such risks to ensure security controls and to ensure that all appropriate security measures are in place.
- Create a Response Team
The next step should involve determining the personnel who will be responsible for dealing with the breach. Such a response team will usually depend on the size of an organisation, but typically it could include: IT security, physical security, legal counsel, human resources, risk and compliance, and management of the affected department. Each member of the team should be assigned a concrete task so that, when a breach occurs, each of them knows how to proceed. It may be helpful to draft rules of procedure describing the composition of the response team, their duties and responsibilities and any particular procedures that must be followed.
- Ensure Appropriate Communication
Clear information concerning what actions must be taken when a breach occurs can save a lot of time and trouble. Internally, employees should be informed when and to whom they must report a breach, when a breach needs to be reported to management and when an investigation must be initiated. The language of the information should be clear and unambiguous. The methods of communication may vary from the existing methods used to contact employees (e.g., email, information on the website, paper notice, etc.).
Organisations should also ensure that service providers are properly informed about the security policies and procedures. To this end, organisations should ensure that agreements with service providers include appropriate security measures and a duty to notify the organisation when a breach occurs on their side.
Dealing with a Data Breach
When an incident occurs, the organisation should be sufficiently prepared to deal with its consequences. The point of reference should be the Response Programme — a document which provides step-by-step guidance regarding the necessary procedures. Compliance with the Response Programme will minimise the risk of any additional negative consequences. A clear and well-written Response Programme can become an indispensible tool for dealing with data breaches effectively and quickly. The different steps of a Response Programme are described in more detail below:
- Identify the Incident
The first step should be to identify an incident. The Response Programme should aim at describing the incidents as broadly as possible. Once the incident has been identified, the unit where the incident occurred should issue a report. The response team should then be notified of this incident. Once the response team determines that the event qualifies as an incident, a formal meeting should be convened where a decision on launching an investigation may be taken.
- Gather Information
Gathering as much information as possible at the beginning may significantly increase the likelihood of success of the outcome. This should include:
- affected data types;
- affected information systems and sensitivity of data;
- number and identity of affected individuals and their contact details; and
- possible consequences of the breach.
Members of the response team should be tasked with the duty of gathering information, but any other competent personnel may also be useful.
- Take Initial Steps
As soon as the breach occurrence is identified, access to data containing personal information should be blocked. The data should also be secured to prevent any additional exposure.
In some jurisdictions it may be necessary to launch an investigation by a third party or to inform the public authorities. If such obligations exist, the organisation should determine who to inform and when.
On the internal level, a thorough investigation should be launched. The Response Programme should be followed in detail and the response team members should execute their duties.
- Ensure Proper Notification
One of the most crucial matters related to dealing with data breaches is ensuring that the notification obligations have been met. Organisations should verify which laws impose breach notification requirements and identify any applicable guidance from data protection authorities. Organisations should carefully assess who to notify (e.g., the regulator and/or the individuals), when and how. Organisations should take into account the fact that notification may not be required in all cases, for example, when appropriate technological measures are implemented.
- Think about the Future
Companies will benefit from carefully evaluating security incidents and incident responses. This will help them to avoid similar breach occurrences in the future, and will help reduce any potential costs. It will also maintain or improve the reputation of the organisation.
Following a security incident, organisations may find it useful to modify or improve their Response Programme. Remedial measures that are appropriate to prevent recurrence of the incident may be documented and implemented.
Finally, some laws may require records of security breaches to be maintained, including details and effects of breaches, and remedial actions taken. Even if there are no such requirements, it is good practice to document the handling of the breach.
Olivier Proust is an Associate with Morrison & Foerster LLP, Brussels, and a member of the Paris Bar. He may be contacted at oproust@mofo.com.
Learn more about Bloomberg Law or Log In to keep reading:
Learn About Bloomberg Law
AI-powered legal analytics, workflow tools and premium legal & business news.
Already a subscriber?
Log in to keep reading or access research tools.