ISE02/19-20
Subject: | constitutional affairs, data breach, personal data, privacy, notification system |
Personal data breach trends in Hong Kong
Year | Private entities | Public entities | Total | No. of affected |
2012-2013 | 29 | 32 | 61 | 17 000 |
2013-2014 | 22 | 54 | 76 | 114 000 |
2014-2015 | 25 | 42 | 67 | 77 000 |
2015-2016 | 60 | 44 | 104 | 854 000 |
2016-2017 | 51 | 37 | 88 | 3 860 000 |
2017-2018 | 79 | 37 | 116 | 765 834 |
Existing voluntary notification system
Mandatory data breach notification in Australia
Development of the mandatory notification system
(a) | Under and delayed reporting: although the number of voluntary reported cases has kept rising in recent years,11Legend symbol denoting The number of voluntarily notified breaches went up from 44 in 2008-2009 to 107 in 2015-2016. there may be under-reporting as entities try to avoid possible damages resulting from making public data breach incidents. Moreover, some may also delay reporting or deliberately covering up incidents;12Legend symbol denoting In one case, a major retailer in Australia only notified its customers and OAIC in 2014 about a data breach involving two million customers' personal data and credit card information stolen by hackers in 2011.
|
(b) | Earlier remedy by affected individuals: data subjects affected by a breach can take prompt remedial actions like cancelling a credit card or changing password to avoid or minimise damages if they are notified early enough;13Legend symbol denoting A government report released in 2014 also suggested a link between increasing identify theft and data breaches, while it was reported by IDCARE, an Australian organization providing identity and cyber security support services, that personal data had been found put on sale in illicit online marketplaces. It was also estimated that at least a third of compromised records were further misused.
|
(c) | Improving compliance: under a mandatory system, an entity is likely to more carefully reconsider what personal information is necessary to collect and how long it should be retained; and
|
(d) | Level playing field: mandatory approach will allow a level playing field for businesses, eliminating inconsistency in handling data breaches. |
Key designs of the notification system in Australia
(a) | Notification threshold: only an eligible data breach has to be notified. An eligible breach must satisfy the following conditions:15Legend symbol denoting There are also exceptions to notify certain breaches even though the three conditions are met. These include whether a notification may prejudice law enforcement matters or violate "secrecy provisions" under other legislation. (i) there is unauthorized access to, disclosure or loss of personal information held by an entity; (ii) this is likely to result in serious harm to one or more individuals from the viewpoint of a reasonable person;16Legend symbol denoting The initial draft of the bill for consultation had used the threshold of "real risk of serious harm". Yet the term was regarded as vague by the business sector. It was then replaced by "likely to result in serious harm", a term that the authorities believed would be of higher threshold and could avoid narrow interpretation that could lead to notification fatigue and create resources issues for the regulator. and (iii) the entity has not been able to prevent the likely risk of serious harm.
The law on notifiable data breaches does not define "serious harm" which, however, may include serious physical, psychological, emotional, financial, or reputational harm, as stated in the explanatory memorandum of the law. Entities suffering from such breaches are advised to evaluate the risks of serious harm "holistically", with references to considerations of relevant matters such as the type and sensitivity of data breached, whether the data is encrypted, the person who obtains the data, the nature of harm, etc. |
(b) | Notification timeframe: an entity has to notify within 30 days from becoming aware of the grounds for suspicion that an eligible breach has occurred to complete an assessment. It must act expeditiously to complete the assessment and then notify as soon as practicable.17Legend symbol denoting This timeframe is less stringent than EU's requirement to notify the supervisory authority after having become aware of the breach within 72 hours. If the assessment goes beyond 30 days, the entity must document all reasonable and expeditious measures that have been taken, and explain the delay. It may also ask the privacy watchdog for time extension.
|
(c) | Notification options and contents: the Australian rules require notification of eligible data breach to both the Commissioner of Information and affected individuals, regardless the type and scale of data breached.18Legend symbol denoting This is different from the EU requirement that notification to the supervisory authority is required when the breach is likely to result in a risk to rights and freedoms, but notification to individuals is required only if such risk of harm is considered high. In doing so, a data controllers must prepare a statement for the Commissioner, providing information on the identity and contact details of the data controllers, a description of data breach, the kind(s) of information involved in the breach, and the recommended steps for affected individuals to take to mitigate the likely damages. Similar information should also be provided for individual notification.
As far as notification to individuals is concerned, an entity can either notify all individuals or only those individuals at risk, depending on whether it can reasonably identify those particular individuals. The latter option can avoid unnecessary distress to individuals, limit possible notification fatigue among the public, and reduce administration costs. If both options are not practicable, the entity should publish a copy of the above-said statement on its website for a period no less than six months or take other reasonable steps to publish it prominently on its website, social media or print advertisement. There is no restriction on the method of notifications, as long as it is reasonable. The privacy law also empowers the Commissioner to direct any entity to notify individuals, in case if a data breach only comes to the attention of the Commissioner or if the entity disagrees with the Commissioner whether a notification is required. |
(d) | Offshore application: the mandatory scheme also applies to overseas activities conducted by entities with Australian links, i.e. organizations incorporated in Australia, organizations conducting business or collecting and holding personal information in Australia. For entities disclosing personal information to overseas recipients (e.g. data held by an offshore service provider), they are required to ensure that the recipient will comply with the Australian privacy principles of the Act when handling that information; and are generally required to hold responsible for complying with the mandatory notification requirements in the event of a data breach.
|
(e) | Penalty for non-compliance: a failure by an entity to meet the mandatory notification requirements is regarded as an interference with the privacy of an individual, for which the Commissioner may also apply to court for a civil penalty order. Such penalty ranges from a maximum fine of A$360 000 (HK$2.1 million) for an individual or A$1.8 million (HK$10.5 million) for a corporate.19Legend symbol denoting This is contrasted to EU, where the privacy authority can impose an administrative fine of up to €10 million (HK92.5 million) or 2% of the annual turnover of a company for failing to notify. |
Effectiveness and issues of concern of DBNS
Concluding remarks
Prepared by CHEUNG Chi-fai
Research Office
Information Services Division
Legislative Council Secretariat
20 November 2019
Australia
| |
1. | Attorney-General's Department. (2014) Identity crime and misuse in Australia Key findings from the National Identity Crime and Misuse Measurement Framework Pilot.
|
2. | Attorney-General's Department. (2016) Serious Data Breach Notification.
|
3. | Australian Law Reform Commission. (2008) For Your Information: Australian Privacy Law and Practice.
|
4. | IDCARE. (2016) Submission to the Serious Data Breach Notification Consultation.
|
5. | Office of the Australian Information Commissioner. (2019a) Notifiable Data Breach (NDB) Scheme.
|
6. | Office of the Australian Information Commissioner. (2019b) Website.
|
7. | Parliament of Australia. (2013) Joint Committee on Intelligence and Security inquiry report.
|
8. | Ponemon Institute. (2017) Cost of Data Breach Study: Australia.
|
9. | Norton Rose Fulbright. (2017) The end of a long road - Mandatory data breach notification becomes law.
|
Hong Kong
| |
10. | Constitutional and Mainland Affairs Bureau. (2019) Motion on "Keeping up with Technological Development and Enhancing the Protection of People's Privacy" at the Legislative Council meeting of 22 May 2019 Progress Report.
|
11. | GovHK. (2018) LCQ2: Enhancing information security and the protection for privacy of personal data.
|
12. | GovHK. (2019) Government notes PCPD report on Cathay Pacific data breach incident.
|
13. | Minutes of Meeting of the Panel on Constitutional Affairs. (2019) 18 March. LC Paper No. CB(2)1703/18-19.
|
14. | PCPD. (2010) Media statement: Privacy Commissioner Publishes Guidance Note on Data Breach Handling and the Giving of Breach Notifications.
|
15. | PCPD. (2019) Data Breach Incident Investigation Report: Cathay Pacific Airways Limited and Hong Kong Dragon Airlines Limited.
|
16. | Report of the Bills Committee on Personal Data (Privacy) (Amendment) Bill 2011 of the Legislative Council. (2012) 30 May. LC Paper No. CB(2)2197/11-12.
|
17. | Wong, Stephen. (2018) Grooving Privacy Evolution with Law Reform and Data Ethics.
|
Others
| |
18. | California Legislative Information. (2019) Civil Code Section 1798.29.
|
19. | EU GDPR.orgn. (2019) Website.
|
20. | ICO. (2019) GDPR One year on.
|
21. | Lexology. (2018) Dutch Authority fines Uber for violation data breach regulation.
|