top of page

1. Purpose

This policy describes how LightYear Docs Pty Ltd (“LightYear Docs” or “LYD”) will respond to a data breach, in adherence to the Privacy Act 1988. It is LYD’ belief that clear roles, responsibilities and procedures will serve as the foundation of a comprehensive privacy program.

This policy outlines:

  • the steps that LYD will take to contain, assess, notify, and review any data breaches that might occur; and

  • Notifiable Data Breaches and how LYD will address them if they occur.

All LYD employees, officers, representatives, or advisers (‘Employees’) are required to understand and act in accordance with this policy.

​

2. Data Breach Definition

A data breach occurs when personal information or intellectual property held by LYD is subject to unauthorised access, disclosure, modification, or is lost. Data breaches can occur in a number of ways, including but not limited to:

  • Unauthorised Third-party security breaches (e.g. Hackers)

  • Unauthorised access, disclosure or modification by Employees and users

  • Data breaches of Third-party services used by LYD that affect user data

Specific to LYDs’ business, the following have been identified as possible data breach sources:

  • Accidental loss, unauthorised access, or theft of classified material data or equipment on which such LYD data is stored, such as company Laptops and USBs.

  • Unauthorised use, access to, or modification of data on LYD cloud databases and AWS.

  • Accidental disclosure of LYD user data or intellectual property, such as via email to an incorrect address.

  • Unauthorised data collection by third parties posing as LYD, e.g. Phishing Scam

  • Failed or successful attempts to gain unauthorised access to LYD information or information systems

  • Unauthorised data collection by third parties through Malware infections on LYD clouds databases, or hardware equipment.

​

3. What to do if a Data Breach is Suspected?

All LYD Employees who are aware of, informed of, or suspect a data breach must inform their IT team immediately. The IT team must then assess the suspected breach to determine whether or not a breach has in fact occurred. If a data breach has, in fact, occurred, then the IT team will manage the breach according to the steps outlined in the Data Breach Response Plan.

​

4. Data Breach Response Plan

In accordance with OAIC recommendations, the following steps will be taken in response to a verified Data Breach;

  • Contain the breach as soon as possible. Containment is ensuring that the breach itself is stopped. How a breach is stopped would depend on the particular instance but can include:

  • The suspension of compromised accounts;

  • Removal of malware, where identified;

  • Temporary platform downtime if necessary;

  • Recovering any lost data, if possible;

  • Restoring access to the platform when able.

  • Assess the risks involved and the repercussions on respective stakeholders. The following may be considered in assessing the stakeholder risks:

  • The type of information involved;

  • Established the cause and the extent of the breach;

  • Assess the risk of hard to affected persons;

  • Assess the risk of other harms: reputational damage;

  • Notify management and affected individual where appropriate;

  • Management must be notified of breaches as and when they occur, whether or not the breach is an eligible breach under the Notifiable Data Breach Scheme;

  • LYD is an APP 11 entity under the Privacy Act 1988 (Cth) and is and must, therefore, comply with its obligations under the Notifiable Data Breach Scheme;

  • Data breaches that are not eligible under the Notifiable Data Breach Scheme need not be reported and may be addressed internally.

  • Prevent similar breaches through strengthening security infrastructures and/or policies

​

5. Notifiable Data Breach Scheme

Under the Notifiable Data Breach Scheme, LYD is obliged to report data breaches that satisfy the following criteria:

  • There is unauthorised access to or unauthorised disclosure of personal information, or a loss of personal information, that LYD holds;

  • That the unauthorised access to or disclosure of, or loss of personal information is likely to result in serious harm to one or more individuals; and

  • LYD has not been able to prevent the likely risk of serious harm with remedial action.

​

For further information on how to assess a notifiable data breach, LYD must refer to the OAIC’s APP guidelines.

Where LYD suspects that an eligible breach has occurred, it must carry out a reasonable and expeditious assessment of the breach: s 26WH(2)(a) of the Privacy Act. Where possible, the assessment must be completed within 30 days of LYD becoming aware of information that causes it to suspect that an eligible breach has occurred.

 

If LYD is unable to complete the assessment within 30 days, a written document must be written which addresses:

  • how all reasonable steps have been taken to complete the assessment within 30 days;

  • the reasons for the delay; and

  • that the assessment was reasonable and expeditious.

​

Where an Eligible Breach has occurred, LYD must inform affected users AND the Privacy Commissioner. LYD is allowed to disclose eligible breaches to users in either of the following ways:

  • It may notify all LYD users

  • It may notify affected LYD users

  • It may publish a notification on its website

​

Disclosure of eligible breaches to the Privacy Commissioner may be done by online form.

For more information on disclosing Eligible Breaches under the Notifiable Data Breach Scheme, please refer to the OAIC’s webpage on the topic.

​

6. Disciplinary Consequences

LYD collects, stores, and processes your data on LYD application, including the LY Surge App and Document Automation Wizard. The data is used to provide Services to you, as well as to facilitate LYD business operations. The Privacy Policy outlined how your data is collected, stored, and processed by LYD. The Privacy Policy also addresses LYD processes, policies, and obligations in respect of data encryption and removal requests.

​

7. Subscription to Use the Service

LYD reserves the right to monitor Employees’ use, access and modification of the company’s data, and initialise an investigation if cases where an employee conducts an action that is in breach of this policy.

All Employees should handle LYDs’ data with due diligence in accordance with this policy and any related policies. If an employee’s action or omission that is prohibited under this policy causes a disruption of integrity to the data system or leads to a breach defined in the Privacy Act, the employee may face severe disciplinary action up to and including termination at the discretion of LYD. 

bottom of page