top of page

1. Purpose

This policy describes how LightYear Docs Pty Ltd (“LightYear Docs” or “LYD”) will respond to a data breach, in adherence to the Privacy Act 1988. It is LightYear Docs’ belief that clear roles, responsibilities and procedures will serve as the foundation of a comprehensive privacy program.

This policy outlines:

  • the steps that LightYear Docs will take to contain, assess, notify, and review any data breaches that might occur; and

  • Notifiable Data Breaches and how LightYear Docs will address them if they occur.

All LightYear Docs employees, officers, representatives, or advisers (‘Employees’) are required to understand and act in accordance with this policy.

​

2. Data Breach Definition

A data breach occurs when personal information or intellectual property held by LightYear Docs is subject to unauthorised access, disclosure, modification, or is lost. Data breaches can occur in a number of ways, including but not limited to:

  • Unauthorised Third-party security breaches (e.g. Hackers)

  • Unauthorised access, disclosure or modification by Employees and users

  • Data breaches of Third-party services used by LightYear Docs that affect user data

Specific to LightYear Docs’ business, the following have been identified as possible data breach sources:

  • Accidental loss, unauthorised access, or theft of classified material data or equipment on which such LightYear Docs data is stored, such as company Laptops and USBs.

  • Unauthorised use, access to, or modification of data on LightYear Docs cloud databases and AWS.

  • Accidental disclosure of LightYear Docs user data or intellectual property, such as via email to an incorrect address.

  • Unauthorised data collection by third parties posing as LightYear Docs, e.g. Phishing Scam

  • Failed or successful attempts to gain unauthorised access to LightYear Docs information or information systems

  • Unauthorised data collection by third parties through Malware infections on LightYear Docs clouds databases, or hardware equipment.

​

3. What to do if a Data Breach is Suspected?

All LightYear Docs Employees who are aware of, informed of, or suspect a data breach must inform their IT team immediately. The IT team must then assess the suspected breach to determine whether or not a breach has in fact occurred. If a data breach has, in fact, occurred, then the IT team will manage the breach according to the steps outlined in the Data Breach Response Plan.

​

4. Data Breach Response Plan

In accordance with OAIC recommendations, the following steps will be taken in response to a verified Data Breach;

  • Contain the breach as soon as possible. Containment is ensuring that the breach itself is stopped. How a breach is stopped would depend on the particular instance but can include:

  • The suspension of compromised accounts;

  • Removal of malware, where identified;

  • Temporary platform downtime if necessary;

  • Recovering any lost data, if possible;

  • Restoring access to the platform when able.

  • Assess the risks involved and the repercussions on respective stakeholders. The following may be considered in assessing the stakeholder risks:

  • The type of information involved;

  • Established the cause and the extent of the breach;

  • Assess the risk of hard to affected persons;

  • Assess the risk of other harms: reputational damage;

  • Notify management and affected individual where appropriate;

  • Management must be notified of breaches as and when they occur, whether or not the breach is an eligible breach under the Notifiable Data Breach Scheme;

  • LightYear Docs is an APP 11 entity under the Privacy Act 1988 (Cth) and is and must, therefore, comply with its obligations under the Notifiable Data Breach Scheme;

  • Data breaches that are not eligible under the Notifiable Data Breach Scheme need not be reported and may be addressed internally.

  • Prevent similar breaches through strengthening security infrastructures and/or policies

​

5. Notifiable Data Breach Scheme

Under the Notifiable Data Breach Scheme, LightYear Docs is obliged to report data breaches that satisfy the following criteria:

  • There is unauthorised access to or unauthorised disclosure of personal information, or a loss of personal information, that LightYear Docs holds;

  • That the unauthorised access to or disclosure of, or loss of personal information is likely to result in serious harm to one or more individuals; and

  • LightYear Docs has not been able to prevent the likely risk of serious harm with remedial action.

​

For further information on how to assess a notifiable data breach, LightYear Docs must refer to the OAIC’s APP guidelines.

Where LightYear Docs suspects that an eligible breach has occurred, it must carry out a reasonable and expeditious assessment of the breach: s 26WH(2)(a) of the Privacy Act. Where possible, the assessment must be completed within 30 days of LightYear Docs becoming aware of information that causes it to suspect that an eligible breach has occurred.

 

If LightYear Docs is unable to complete the assessment within 30 days, a written document must be written which addresses:

  • how all reasonable steps have been taken to complete the assessment within 30 days;

  • the reasons for the delay; and

  • that the assessment was reasonable and expeditious.

​

Where an Eligible Breach has occurred, LightYear Docs must inform affected users AND the Privacy Commissioner. LightYear Docs is allowed to disclose eligible breaches to users in either of the following ways:

  • It may notify all LightYear Docs users

  • It may notify affected LightYear Docs users

  • It may publish a notification on its website

​

Disclosure of eligible breaches to the Privacy Commissioner may be done by online form.

For more information on disclosing Eligible Breaches under the Notifiable Data Breach Scheme, please refer to the OAIC’s webpage on the topic.

​

6. Disciplinary Consequences

LightYear Docs collects, stores, and processes your data on LightYear Docs application, including the LY Surge App and Document Automation Wizard. The data is used to provide Services to you, as well as to facilitate LightYear Docs business operations. The Privacy Policy outlined how your data is collected, stored, and processed by LightYear Docs. The Privacy Policy also addresses LightYear Docs processes, policies, and obligations in respect of data encryption and removal requests.

​

7. Subscription to Use the Service

LightYear Docs reserves the right to monitor Employees’ use, access and modification of the company’s data, and initialise an investigation if cases where an employee conducts an action that is in breach of this policy.

All Employees should handle LightYear Docs’ data with due diligence in accordance with this policy and any related policies. If an employee’s action or omission that is prohibited under this policy causes a disruption of integrity to the data system or leads to a breach defined in the Privacy Act, the employee may face severe disciplinary action up to and including termination at the discretion of LightYear Docs. 

bottom of page