Skip to main content

Calculating the severity of a data breach

While at the 2019 IAPP Privacy. Security. Risk. conference, I was introduced
to the European Union Agency for Network and Information Security (ENISA)'s "Recommendations for a methodology of the assessment of severity of personal data breaches" in Liisa M. Thomas's Data Breach Bootcamp. The methodology allows you to calculate the severity of a data breach from the perspective of a data subject: what's the personal harm?

The methodology systematizes and standardizes the calculation “estimation of
the magnitude of potential impact on the individuals derived from the data
breach”. By answering a few questions about the breach, the methodology produces
a severity score:

  1. Low: Individuals either will not be affected or may
    encounter a few inconveniences, which they will overcome without any problem
    (time spent re-entering information, annoyances, irritations, etc.).
  2. Medium: Individuals may encounter significant
    inconveniences, which they will be able to overcome despite a few
    difficulties (extra costs, denial of access to business services, fear, lack
    of understanding, stress, minor physical ailments, etc.).
  3. High: Individuals may encounter significant
    consequences, which they should be able to overcome albeit with serious
    difficulties (misappropriation of funds, blacklisting by banks, property
    damage, loss of employment, subpoena, worsening of health, etc.).
  4. Very High: Individuals may encounter significant, or
    even irreversible, consequences, which they may not overcome (financial
    distress such as substantial debt or inability to work, long-term
    psychological or physical ailments, death, etc.).

I created a spreadsheet to calculate the score. I suggest using it anytime
you have a breach and add the score to your security or privacy incident log.
Having a standard way to measure harm can be helpful when determining if there
is a need to notify individuals or supervisory authorities.

You are free to download, use, modify, and share the spreadsheet. Please feel
free to offer suggestions for improvements:

Comments

  1. Hi there! This is such a great help, however, i'm having rouble with the formula that you have inserted for the CB score and the overall Severity scoring. I keep getting a notitication that the formula ins't working. Any way to work around this?

    ReplyDelete

Post a Comment

Popular posts from this blog

GDPR Gap Assessment template

It's hard to believe I'm still talking to companies who are only now getting started on GDPR compliance. In fact, Cisco's 2019 Data Privacy Benchmark Study found that only 59% of the 3,206 organizations they surveyed felt they were largely compliant. Nine percent had not even started their compliance work: There are other companies who are thinking to entering the EU market and they are starting down the path of understanding what is required from a GDPR perspective. If I were starting my GDPR compliance journey, the first thing I would do is a gap assessment. There are many outstanding gap assessment tools available, including: Data Protection Self Assessment https://ico.org.uk/for-organisations/data-protection-self-assessment/ ISACA-CMMI GDPR Assessment (requires ISACA membership) http://www.isaca.org/knowledge-center/research/researchdeliverables/pages/isaca-cmmi-gdpr-assessment.aspx Nymity GDPR Readiness Assessment Questions https://info.nymity.com/gdpr-c

Italian translation of Data Protection Impact Assessment

I am very happy to announce that Glauco Rampogna has translated my Data Protection Impact Assessment into Italian! He proactively volunteered to do this, following my philosophy of trying to make things easier for others. Both Glauco and I hope you find this translation helpful in your GDPR compliance efforts! Excel: Data Protection Impact Assessment template - Italian ODS:  Data Protection Impact Assessment template - Italian See How to Perform a Data Protection Impact Assessment for English versions of the template and for examples of data mappings. About Glauco: He's an ISO/IEC 27001 Lead Auditor and Data Protection Officer, and works in public sector as System Administrator. If you have questions, you may contact him at  Glaucorampogna@gmail.com .