Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.



  • Contact Us
  • Home
  • For IT & Compliance
  • PlayerLync Data, Security & Privacy
  • Data

Data Breach Response and Notification Procedure

base 1.0

Written by Russell Fick

Updated at February 2nd, 2022

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Technical FAQs
  • Getting Started
    Launching PlayerLync Platform Basics Device / App Install & Setup PlayerLync Support Getting Started FAQs Did You Know?
  • PlayerLync in Detail
    PlayerLync Apps Admin Portal Team Manager Shared Library Collaboration Suite Intranet
  • For IT & Compliance
    App Deployment Methods Supported Devices & Browsers PlayerLync API PlayerLync Data, Security & Privacy
  • Release Notes
    Release Notes - Dashboard Release Notes - Admin Portal / Team Manager (Web) Release Notes - PlayerLync for iOS (App) Release Notes - PlayerLync for Android (App) Release Notes Archive
  • Company Info
    Who is PlayerLync?
+ More


DATA BREACH RESPONSE AND NOTIFICATION PROCEDURE - TABLE OF CONTENTS



1.SCOPE, PURPOSE AND USERS

2.REFERENCE DOCUMENTS

3.DEFINITIONS

4.DATA BREACH RESPONSE TEAM

5.DATA BREACH RESPONSE TEAM DUTIES

6.DATA BREACH RESPONSE PROCESS

7.PERSONAL DATA BREACH NOTIFICATION: DATA PROCESSOR TO DATA CONTROLLER

8.PERSONAL DATA BREACH NOTIFICATION: DATA CONTROLLER TO SUPERVISORY AUTHORITY

9.PERSONAL DATA BREACH NOTIFICATION: DATA CONTROLLER TO DATA SUBJECT

10.ACCOUNTABILITY

11.MANAGING RECORDS KEPT ON THE BASIS OF THIS DOCUMENT

12.VALIDITY AND DOCUMENT MANAGEMENT

 

  1. SCOPE, PURPOSE AND USERS


This Procedure provides general principles and approach model to respond to, and mitigate breaches of personal data (a “personal data breach”) in one or both of the following circumstances: 

  • The personal data identifies data subjects who are residents of the Member States of the European Union (EU) and countries in the European Economic Area (EEA), regardless of where that data is subject to processing globally; and 

  • The personal data is subject to processing in the EU and/or EEA, regardless of the country of residency of the data subject.  

The Procedure lays out the general principles and actions for successfully managing the response to a data breach as well as fulfilling the obligations surrounding the notification to Supervisory Authorities and individuals as required by the EU GDPR.  

All Employees/Staff, contractors or temporary Employees/Staff and third parties working for or acting on behalf of PlayerLync (“Company”) must be aware of, and follow this Procedure in the event of a personal data breach. 

 

  1. REFERENCE DOCUMENTS


  • EU GDPR 2016/679 (Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC) 

  • Personal Data Protection Policy 

 

  1. Definitions 

The following definitions of terms used in this document are drawn from Article 4 of the European Union’s General Data Protection Regulation (GDPR):  

“Personal Data” means any information relating to an identified or identifiable natural person (‘data subject’); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person Regulation. 

“Controller” is the natural or legal person, public authority, agency or any other body, which alone or jointly with others, determines the purposes and means of the processing of personal data. 

“Processor” is a natural or legal person, public authority, agency or any other body which processes personal data on behalf of a Data Controller. 

“Processing” means any operation or set of operations which is performed on personal data or on sets of personal data, whether by automated means, such as collection, recording, organisation, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction. 

“Personal Data Breach” means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data transmitted, stored or otherwise processed. 

“Supervisory Authority” means an independent public authority which is established by a Member State pursuant to Article 51. 

 

    1. DATA BREACH RESPONSE TEAM


A Data Breach Response Team must be a multi-disciplinary team comprised of knowledgeable and skilled individuals in IT Department, IT Security, Legal, Legal and Public Affairs The team may be a physical (local) or virtual (multiple locations) team which responds to any suspected/alleged personal data breach.  

CTO appoints the members of the Data Breach Response Team. The Team must be appointed regardless of whether or not a breach has occurred.  

The team must ensure that necessary readiness for a personal data breach response exists, along with the needed resources and preparation (such as call lists, substitution of key roles, desktop exercises, plus required review of company policies, procedures and practices). 

The team’s mission is to provide an immediate, effective, and skilful response to any suspected/alleged or actual personal data breaches affecting the Company. 

If required, the team members may also involve external parties (e.g. an information security vendor for carrying out digital forensics tasks or an external communications agency for assisting the Company in crisis communications needs. 

The Data Breach Response Team Leader [CTO - Greg Menard] can choose to add additional personnel to the team for the purposes of dealing with a specific personal data breach.  

The Data Breach Response Team may deal with more than one suspected/alleged or actual personal data breach at a time. Although the core team may be the same for each suspected/alleged or actual personal data breach, there is no requirement for this. 

The Data Breach Response Team must be prepared to respond to a suspected/alleged or actual personal data breach 24/7, year-round. Therefore, the contact details for each member of the Data Breach Response Team, including personal contact details, shall be stored in a central location, and shall be used to assemble the team whenever notification of a suspected/alleged or actual personal data breach is received. 

The team consists of the following members, as of November 18th, 2019:  Greg Menard, Bob Paulsen, Dean Okimoto, Miguel DeJesus, Doug Andrew, Robert Smith, Gary Ilis, Cary Yokum, Doug Wieder, Russ Fick 

 

    1. DATA BREACH RESPONSE TEAM DUTIES


Once a personal data breach is reported to the Data Breach Response team leader, the team must implement the following: 

  • Validate/triage the personal data breach 

  • Ensure proper and impartial investigation (including digital forensics if necessary) is initiated, conducted, documented, and concluded 

  • Identify remediation requirements and track resolution 

  • Report findings to the top management 

  • Coordinate with appropriate authorities as needed 

  • Coordinate internal and external communications 

  • Ensure that impacted data subjects are properly notified, if necessary 

The Data Breach Response Team will convene for each reported (and alleged) personal data breach, and will be headed by the Data Breach Response Team Leader.   

 

    1. DATA BREACH RESPONSE PROCESS


The Data Breach Response Process is initiated when anyone who notices that a suspected/alleged or actual personal data breach occurs, and any member of the Data Breach Response team is notified. The team is responsible to determine if the breach should be considered a breach affecting personal data.  

The Data Breach Team leader is responsible for documenting all decisions of the core team. Since these documents might be reviewed by the supervisory authorities, they need to be written very precisely and thoroughly to ensure traceability and accountability. 

 

    1. PERSONAL DATA BREACH NOTIFICATION: DATA PROCESSOR TO DATA CONTROLLER


When the personal data breach or suspected data breach affects personal data that is being processed on behalf of a third party, the Data Protection Officer of the Company acting as a data processor must report any personal data breach to the respective data controller/controllers without undue delay. 

The Data Protection Officer will send Notification to the controller that will include the following: 

  • A description of the nature of the breach 

  • Categories of personal data affected 

  • Approximate number of data subjects affected 

  • Name and contact details of the Data Breach Response Team Leader/ Data Protection Officer 

  • Consequences of the personal data breach 

  • Measures taken to address the personal data breach 

  • Any information relating to the data breach 

 

Data Protection Officer (DPO) will record the data breach into the Data Breach Register. 

 

    1. PERSONAL DATA BREACH NOTIFICATION: DATA CONTROLLER TO SUPERVISORY AUTHORITY


When the personal data breach or suspected data breach affects personal data that is being processed by the Company as a data controller, the following actions are performed by the Data Protection Officer: 

  1. The Company must establish whether the personal data breach should be reported to the Supervisory Authority.  

  1. In order to establish the risk to the rights and freedoms of the data subject affected, the Data Protection Officer must perform the Data Protection Impact Assessment on the processing activity affected by the data breach.  

  1. If the personal data breach is not likely to result in a risk to the rights and freedoms of the affected data subjects, no notification is required. However, the data breach should be recorded into the Data Breach Register. 

  1. The Supervisory Authority must be notified with undue delay but no later than in 72 hours, if the personal data breach is likely to result in a risk to the rights and freedoms of the data subjects affected by the personal data breach. Any possible reasons for delay beyond 72 hours must be communicated to the Supervisory Authority. 

DPO or CTO will send Notifications to the Supervisory Authority that will include the following: 

  • A description of the nature of the breach 

  • Categories of personal data affected 

  • Approximate number of data subjects affected 

  • Name and contact details of the Data Breach Response Team Leader/ Data Protection Officer 

  • Consequences of the personal data breach 

  • Measures taken to address the personal data breach 

  • Any information relating to the data breach  

 

  1. PERSONAL DATA BREACH NOTIFICATION: DATA CONTROLLER TO DATA SUBJECT


CTO or CEO must assess if the personal data breach is likely to result in high risk to the rights and freedoms of the data subject. If yes, the Data Protection Officer the Company must notify with undue delay the affected data subjects.  

The Notification to the data subjects must be written in clear and plain language and must contain the same information listed in Section 7.  

If, due to the number of affected data subjects, it is disproportionately difficult to notify each affected data subject, the CTO (or DPO) must take the necessary measures to ensure that the affected data subjects are notified by using appropriate, publicly available channels.  

 

  1. ACCOUNTABILITY


Any individual who breaches this Procedure may be subject to internal disciplinary action (up to and including termination of their employment); and may also face civil or criminal liability if their action violates the law.  

 

    1. MANAGING RECORDS KEPT ON THE BASIS OF THIS DOCUMENT



Record name 

Storage location 

Person responsible for storage 

Controls for record protection 

Retention time 

Call lists & substitution  

OneDrive 

[data breach response team] 

[only authorized persons can edit the files] 

7 years 

Contact details 

OneDrive 

[data breach response team] 

[only authorized persons can edit the files] 

7 years 

Documented decisions of the Data Breach Response Team 

OneDrive 

[data breach response team] 

[only Data Breach Response Team leader can edit the files] 

7 years 

Data breach notifications 

OneDrive 

CTO or DPO 

 

[only Data Breach Response Team leader can edit the files] 

7 years 

Data Breach Register 

OneDrive 

CTO or DPO 

[only Data Protection Officer can edit the files] 

7 years 

 

  1. VALIDITY AND DOCUMENT MANAGEMENT


This document is valid as of 10/15/2021. 

The owner of this document is DPO, who must check and, if necessary, update the document at least once a year. 

 


Was this article helpful?

Yes
No

On this page

Related Articles

  • California Consumer Privacy Act (CCPA)
  • Encryption & Data Protection
  • GDPR Compliance Statement
  • Server Releases

© 2025 PlayerLync, LLC. ALL RIGHTS RESERVED

A Mobile Workforce Enablement Platform

Knowledge Base Software powered by Helpjuice

Definition by Author

0
0
Expand