Non-binding translation
This is an informational English translation. The legally binding version is the German original.
INCIDENT RESPONSE PLAN
Procedure for Personal Data Breaches pursuant to Art. 33/34 GDPR
meisterwork GmbH
Version: 1.0
Last updated: 01/11/2025
1. Purpose and Scope
This plan governs how to deal with personal data breaches ("data breaches") at meisterwork GmbH. It ensures that:
-
Incidents are detected and contained quickly
-
Statutory notification obligations are fulfilled
-
Affected individuals are appropriately informed
-
Lessons are learned from incidents
Scope: All employees, resellers and sub-processors
2. Definition of a Personal Data Breach
A personal data breach occurs in the case of:
-
Destruction: Unintentional or unlawful loss of data
-
Loss: Data is no longer available
-
Alteration: Unauthorised manipulation of data
-
Unauthorised disclosure: Access by unauthorised persons
-
Unauthorised access: Intrusion into systems
Examples:
-
Hacker attack on the server
-
Loss of data carriers
-
Accidental e-mail sent to the wrong recipient
-
Ransomware infection
-
Unauthorised employee access
-
SQL injection or other security vulnerabilities
-
Note: In the case of issues with payment data, Stripe must be informed separately as the payment service provider
3. Organisational Structure
3.1 Incident Response Team
Data Protection Team Lead:
-
Name: Georg Kitz
-
Telephone: +43 720 317 836
-
E-mail: support@bessa.app
-
Deputy: Daniel Lichtenegger
Technical Lead:
-
Name: Richard Marktl
-
Responsible for: Technical containment
Communications Lead:
-
Name: Daniel Lichtenegger
-
Responsible for: External communication
3.2 Availability
-
Telephone: +43 720 317 836
-
E-mail: support@bessa.app
4. Procedural Steps
PHASE 1: IMMEDIATE MEASURES (0-4 hours)
1.1 Detection and Initial Assessment
Who: Any employee who detects an incident
What:
-
Immediate notification to the Incident Response Team
-
No unilateral actions
-
Secure evidence (screenshots, logs)
Notification content:
-
Time of detection
-
Type of incident
-
Affected systems / data
-
Damage that has already occurred
-
Initial estimate of the scope
1.2 Containment
Who: Technical Lead
What:
-
[ ] Isolate affected systems
-
[ ] Lock access
-
[ ] Prevent further spread
-
[ ] Check backup status
-
[ ] Create forensic copies
1.3 Initial Documentation
Who: Data Protection Team Lead
What: Documentation in the incident log:
-
Timestamps of all actions
-
Persons involved
-
Measures taken
-
Communication
Contact for incidents: support@bessa.app
PHASE 2: ANALYSIS AND ASSESSMENT (4-24 hours)
2.1 Detailed Analysis
Determine scope:
-
[ ] Number of affected records
-
[ ] Categories of affected individuals
-
[ ] Type of affected data
-
[ ] Sensitivity of the data
-
[ ] Period of unauthorised access
Root-cause analysis:
-
[ ] How did the incident occur?
-
[ ] Technical failure?
-
[ ] Human error?
-
[ ] Malicious act?
2.2 Risk Assessment
Risk matrix:
|
Criterion |
Low Risk |
Medium Risk |
High Risk |
|---|---|---|---|
|
Data categories |
Public data |
Contact data, order data, receipts |
Health data, special categories |
|
Number of affected |
< 100 |
100-1000 |
> 1000 |
|
Identifiability |
Pseudonymised |
Indirectly identifiable |
Directly identifiable |
|
Severity of consequences |
None / minor inconvenience |
Manageable disadvantages |
Substantial disadvantages |
Note:
-
Since no sensitive payment data (credit cards, bank details) is stored in the bessa system, the risk in case of data breaches is reduced. Payment data is processed exclusively via Stripe.
-
Hospitality: No ID or registration data is processed in bessa, only billing data for additional services and, where applicable, customer loyalty data.
Decision tree:
-
High risk → Notify the authority AND the affected individuals
-
Medium risk → Notify the authority; inform the affected individuals on a case-by-case basis
-
Low risk → Notify the authority; usually no information for affected individuals
PHASE 3: NOTIFICATION (24-72 hours)
3.1 Notification to the Authority (Art. 33 GDPR)
Deadline: Within 72 hours of becoming aware
To: The competent data protection authority
-
Austria:
datenschutzbehoerde@dsb.gv.at
-
Germany:
poststelle@bfdi.bund.de
Content of the notification:
-
Nature of the breach
-
Categories and approximate number of affected individuals
-
Categories and approximate number of records
-
Name / contact of the data protection officer
-
Likely consequences
-
Measures taken / proposed
Template: See Appendix A
3.2 Information of Affected Individuals (Art. 34 GDPR)
When: In the case of a high risk to rights and freedoms
Exceptions to the duty to inform:
-
The data was encrypted
-
Subsequent measures eliminate the high risk
-
Disproportionate effort (then public announcement)
Content:
-
Comprehensible description of the breach
-
Contact details for further information
-
Likely consequences
-
Measures taken
-
Recommendations for affected individuals
Communication channels:
-
Direct e-mail (preferred)
-
Letter
-
Website notice
-
App notification
PHASE 4: RECOVERY (1-7 days)
4.1 System Cleanup
-
[ ] Remove malware
-
[ ] Close security gaps
-
[ ] Apply patches
-
[ ] Reset passwords
4.2 Data Recovery
-
[ ] Restore from backups
-
[ ] Verify integrity
-
[ ] Test functionality
4.3 Resumption of Operations
-
[ ] Gradual activation
-
[ ] Increased monitoring
-
[ ] Communication to users
PHASE 5: FOLLOW-UP (7-30 days)
5.1 Lessons Learned
Conduct: Within 2 weeks after the incident
Participants:
-
Incident Response Team
-
Affected departments
-
Management
Agenda:
-
Timeline of events
-
What went well?
-
What went badly?
-
Suggestions for improvement
-
Action plan
5.2 Documentation
Final report includes:
-
Complete chronology
-
Root-cause analysis
-
Impacts
-
Measures taken
-
Costs
-
Improvement measures
5.3 Preventive Measures
-
[ ] Update security policies
-
[ ] Strengthen technical measures
-
[ ] Employee training
-
[ ] Adjust processes
5. Special Scenarios
5.1 Ransomware Attack
-
Immediately: Disconnect the network
-
Check backup integrity
-
No ransom payment without legal advice
-
File a criminal complaint
-
Contact BSI / CERT
5.2 Data Leak by an Employee
-
Withdraw access rights immediately
-
Consider employment-law steps
-
Determine the scope of the disclosure
-
File a criminal complaint where appropriate
5.3 Loss of Hardware
-
Remote wipe if possible
-
Change passwords
-
Check encryption status
-
Notify the police in case of theft
5.4 Misdirected E-Mails
-
Attempt recall
-
Ask the recipient to delete
-
Request a confidentiality undertaking
-
Inform affected individuals
5.5 Hospitality-Specific Scenarios
Unauthorised access to billing data:
-
Lock access immediately
-
Determine the scope of the data viewed
-
Inform affected hotels / guests
-
Implement enhanced access controls
Incorrect room allocation:
-
Make corrections in the system
-
Correct affected invoices
-
Internal documentation
-
Review processes
5.6 Tax Advisor-Specific Scenarios
Unauthorised access by a tax advisor / accountant:
-
Lock access immediately
-
Inform clients
-
Determine the scope of the data viewed
-
Documentation for professional supervision
-
Where appropriate, report to the tax advisor chamber
Compromised tax advisor credentials:
-
Immediate password reset
-
Review of all access
-
Information to affected clients
-
Activate two-factor authentication
-
Security training for the firm
6. Communication Plan
6.1 Internal Communication
-
Employees: Via intranet / e-mail
-
Resellers: Immediate notification by e-mail
-
Management: Personal information
6.2 External Communication
Communication matrix:
|
Stakeholder |
Channel |
Timing |
Responsible |
|---|---|---|---|
|
Authorities |
E-mail / portal |
< 72h |
Data protection team |
|
Affected individuals |
E-mail / letter |
Without undue delay |
Communications |
|
Press |
Press release |
As needed |
Management |
|
Partners |
|
< 24h |
Account management |
6.3 Communication Templates
-
See Appendices B-E
7. Contact List
Internal Contacts
|
Role |
Name |
Telephone |
|
|---|---|---|---|
|
Management |
DI D. Lichtenegger |
+43 XXX |
d.lichtenegger@meisterwork.com |
|
IT Security |
[Name] |
[Tel] |
[E-mail] |
|
Legal |
[Name] |
[Tel] |
[E-mail] |
External Contacts
|
Organisation |
Contact |
Availability |
|---|---|---|
|
Data Protection Authority AT |
+43 1 52152-0 |
Office hours |
|
http://CERT.at |
+43 1 5056416 78 |
24/7 |
|
Cyber insurance |
[Number] |
24/7 |
|
IT forensics |
[Service provider] |
24/7 |
|
Legal advice |
[Firm] |
Office hours |
8. Technical Tools
8.1 Monitoring Tools
-
AWS CloudWatch
-
Intrusion Detection System
-
Log analysis tools
8.2 Documentation Tools
-
Incident tracking system (Jira)
-
Encrypted communication
-
Secure document storage
9. Training and Exercises
9.1 Training Plan
-
Q1: General awareness raising
-
Q2: Phishing simulation
-
Q3: Incident response exercise
-
Q4: Lessons-learned workshop
9.2 Exercise Scenarios
-
Tabletop exercise (semi-annually)
-
Technical simulation (annually)
-
Communication exercise (annually)
10. Maintenance of the Plan
-
Review: Annually or after major incidents
-
Responsible: Data Protection Team Lead
-
Next review: [date]
APPENDICES
Appendix A: Notification Template for the Data Protection Authority
Subject: Notification of a personal data breach pursuant to Art. 33 GDPR
Dear Sir or Madam,
We hereby report a personal data breach:
-
Contact details of the controller:
-
meisterwork GmbH
-
[Further details]
-
Time and nature of the breach:
-
Date / time of the breach: [date]
-
Date / time of becoming aware: [date]
-
Nature: [Unauthorised access / loss / destruction]
-
Affected individuals and data categories:
-
Number of affected individuals: [approx. X]
-
Categories: [Customers / employees / etc.]
-
Data categories: [Name, e-mail, etc.]
[Further details pursuant to Art. 33 GDPR]
Appendix B: Information Letter to Affected Individuals
[Template for information to affected individuals]
Appendix C: Internal Escalation Matrix
[Who is informed, and when]
Appendix D: Checklists
[Detailed checklists for each phase]
Appendix E: Legal Foundations
-
GDPR Art. 33 – Notification to the supervisory authority
-
GDPR Art. 34 – Information of affected individuals
-
GDPR Art. 32 – Security of processing
Document history:
|
Version |
Date |
Change |
Author |
|---|---|---|---|
|
1.0 |
[date] |
Initial creation |
[Name] |
Approval:
Management: _________________ Date: _______