Reporting a data breach: How companies react correctly
A data loss or data theft (also known as a “data breach”) can have serious consequences for companies and affected individuals - from financial losses and legal consequences to severe reputational damage. The causes of such a data protection incident are manifold: cyber attacks by hacker groups, the incorrect sending of emails or documents, the loss of unencrypted data carriers or even technical misconfigurations that can lead to the loss or outflow of data.
If a data protection incident becomes known in the company, a quick, clear and structured approach is crucial in order to comply with the statutory reporting and notification obligations to supervisory authorities and data subjects (and, if applicable, to clients).
What is a data breach?
According to Art. 4 No. 12 GDPR, a data protection incident (data breach) is defined as a breach of security leading to the destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored or otherwise processed.
A data protection incident occurs whenever an unauthorized act - i.e. unlawful processing - impairs (or may impair) the confidentiality, availability or integrity of personal data.
Examples of data breaches:
- Cyberattack: Hacker attacks or ransomware attacks that encrypt or steal data
- Misdirected emails: Personal or confidential data is inadvertently sent to the wrong recipient
- Loss of data carriers: Unencrypted USB sticks, laptops or external hard drives are lost
- Technical errors: Misconfigurations or software errors lead to unauthorized access to data.
When does a data breach have to be reported?
In the event of a data breach, there is an obligation to notify the competent data protection authority if the incident is likely to result in a risk to the rights and freedoms of data subjects (see Art. 33 GDPR). The deadline for this notification is 72 hours after the incident becomes known.
If there is even a high risk to the rights and freedoms of the data subjects, they must be notified without undue delay (see Art. 34 GDPR). Notification can only be omitted if, for example, the data concerned is protected by suitable technical and organizational measures (e.g. encryption), subsequent measures have completely eliminated the high risk or, exceptionally, a disproportionate effort is involved and a public announcement is made instead (cf. Art. 34 para. 3 GDPR).
Companies are therefore under considerable time and action pressure to quickly analyze the incident, draw the right conclusions and initiate appropriate measures.
Examples of a “high risk”:
🚨 Identitätsdiebstahl oder -betrug
🚨 Finanzieller Schaden für Betroffene
🚨 Diskriminierung durch veröffentlichte Daten
🚨 Gesundheitsdaten oder andere sensible Informationen wurden offengelegt
Evaluation of “risk” and “high risk”
As soon as a data protection incident becomes known, the controller must immediately take measures to contain it and assess the risk for the data subjects. This assessment is used to decide whether it is necessary to notify the supervisory authority and inform the data subjects. A risk exists in particular if there is a threat of physical, material or immaterial damage (see recital 75 GDPR).
The distinction between “risk” and “high risk” is often complex in practice. Guidance is provided by the opinions of the supervisory authorities and the European Data Protection Board (EDPB) Guidelines 9/2022 on the notification of personal data breaches under the GDPR. In particular, discrimination, identity theft or fraud, financial loss, damage to reputation and the disclosure of special categories of personal data (e.g. health data, ethnic origin or political opinion) are cited as examples of a high risk.
The risk assessment includes in particular
- die Art der Verletzung (z. B. Verletzung der Vertraulichkeit oder Verfügbarkeit),
- the sensitivity, scope and identifiability of the data concerned,
- the severity of the possible consequences (e.g. identity theft, damage to reputation),
- Special characteristics of the affected persons (e.g. children)
- and the controller (e.g. medical facility) must be taken into account.
The risk is determined by the interplay between the severity of the impact and the probability of occurrence. For example, the EDPB states that a ransomware attack on a hospital generally entails both a notification obligation to the supervisory authority and a obligation to notify the persons affected, whereas an incorrectly sent email does not always have to be reported.
What content must the notification contain?
When notifying the supervisory authority, the controller must provide the following information (see Art. 33 (3) GDPR):
- Description of the breach: Type of data breach, specifying the categories of data affected, the approximate number of data subjects and data records affected.
- Contact information: Name and contact details of the data protection officer or a responsible contact point for queries.
- Impact assessment: Description of the likely consequences of the data breach for the data subjects.
- Measures taken: Description of the measures taken or planned to remedy the data breach and to limit the damage.
What documentation obligations exist?
Regardless of whether a reporting obligation exists, every breach must be recorded in internal documentation (see Art. 33 para. 5 GDPR and Art. 5 para. 2 GDPR on the principle of accountability). The supervisory authority can request this documentation at any time. The following points should therefore be recorded internally:
- Nature of the data breach, including cause and data affected
- Potential impact and consequences for the persons concerned
- Remedial measures taken to limit damage
- Explanation if no notification is made to the authority
How are data breaches at processors to be handled?
If a data protection incident occurs at a processor and personal data of the client (as controller) is affected, the processor must inform the controller without undue delay (see Art. 33 para. 2 GDPR). Often, even shorter deadlines (e.g. 24 hours) are provided for in the data processing agreement (DPA). It does not matter whether there is a risk to the data subjects; all relevant incidents must be reported. As the processor has a duty to assist the controller, the notification should cover the key points from Art. 33 para. 3 GDPR (description of the breach, contact information, impact assessment, measures).
Step-by-step: managing data breaches correctly
Companies should implement a documented process with clearly defined roles and responsibilities. This process must cover the following steps and reporting lines in particular:
1. Identification & initial assessment | Report breach or suspicions → Inform IT & data protection officer (DPO) |
2. containment & investigation | IT secures systems, DPO collects information |
3. risk assessment & decision | DPO assesses risk, proposal for decision on notification to authority and affected parties, involvement of legal department and management |
4. Notification & communication | Adhere to deadlines: 72h for authorities, without delay for affected individuals; involve corporate communications |
5. follow-up & prevention | Analysis, documentation, adaptation of security measures, training of employees |
Summary
Datenschutzverletzungen können für Unternehmen und betroffene Personen erhebliche Folgen haben. Ein klar definierter Prozess mit eindeutigen Zuständigkeiten ist daher unverzichtbar. Entscheidend sind die rasche Identifikation eines Vorfalls und sofortige Maßnahmen zur Eindämmung sowie eine gründliche Risikobewertung und umfassende Dokumentation. Eine regelmäßige Schulung der Beschäftigten hilft dabei, Datenschutzvorfälle von vornherein zu vermeiden. Durch eine sorgfältige Nachbereitung lassen sich wirkungsvolle Präventionsmaßnahmen ableiten und das Risiko künftiger Vorfälle spürbar verringern.