A Collection is a selection of features, articles, comments and opinions on any given theme or topic. It allows you to stay up‑to‑date with what interests you most.
Login here to access your saved articles and followed authors.
We have sent you an email so you can reset your password.
Sorry, we had a problem.
Tags related to this article
Download PDF Print page
Published 24 March 2022
Earlier this month, the UK’s Data Protection Authority, the Information Commissioner’s Office (the “ICO”) published its Guidance on Ransomware and data protection compliance (the “Guidance”). The Guidance, presented through eight scenario-based examples, provides helpful commentary as to the ICO’s approach to ransomware incidents and also serves as a useful reminder of steps which can be taken to mitigate the risk of such attacks. .
According to the ICO, ransomware is becoming increasingly damaging - a trend which is expected to continue, driven by the surge in threat actors’ use of data exfiltration and subsequent publication as methods of exerting additional pressure on victims to pay. The Guidance, while not legally binding, is likely to be central in advising the ICO’s approach to considering enforcement action against controllers who submit data breach notifications arising from ransomware incidents.
We have summarised herein the key takeaways from the Guidance by reference to the eight main topics it addresses.
The ICO seeks to challenge the popular belief that ransomware attacks are strictly targeted in nature and aimed solely at large corporations, by noting that “scatter gun” campaigns undertaken via mass phishing are common. Accordingly, the Guidance advises that SMEs should consider obtaining the Cyber Essentials certification by the National Cyber Security Centre (the “NCSC”) in order to boost their protection capabilities against more commonplace attacks. For larger organisations, the Guidance recommends an assessment against the NCSC’s “10 Steps to Cyber Security” guidance and certification under the ISO27001 Standard for Information Security Management.
In its Guidance, the ICO reminds controllers that when they become the subject of a cyber-attack, such as ransomware, the UK GDPR confers on them a responsibility to determine if the incident has led to a personal data breach. The regulator is clear that even temporary loss of access to personal data amounts to an availability-type data breach, as much as a breach of confidentiality does. Whether the breach is notifiable to the ICO or to data subjects under the UK GDPR is a matter of a risk assessment.
The Guidance confirms that the issue of exfiltration is an important factor when conducting a risk assessment after a ransomware incident. Whether data has been exfiltrated by a threat actor is a factor when considering the risks to individuals following such an incident.
It is notable that where, following a breach notification, a controller claims that there has been no data exfiltration, the ICO will expect appropriate logs evidencing this. If such logs are not present to enable informed decision-making, it may be helpful to determine if the threat actor had the “means, motivation and opportunity” to exfiltrate the personal data.
Although the UK has left the European Union, the ICO’s website advises that guidelines issued by the European Data Protection Board and its predecessor, the Article 29 Working Party, continue to be “relevant”. This would include the Guidelines on Data Breach Notification, as well as their case-based supplement, the Guidelines on Examples regarding Data Breach Notification which may provide controllers with additional assistance when conducting a data breach risk assessment. Controllers should also be aware of any recommendations issued under relevant codes of conduct or sector-specific requirements they may be subject to.
The ICO recommends that victims of ransomware should contact law enforcement (such as Action Fraud or local Police) in parallel to any notifications mandated under the UK GDPR or other laws. However, while recognising the importance of law enforcement agencies’ role in the “multi-agency response to ransomware”, the Guidance states that requests to delay data subject notifications by law enforcement bodies do not automatically mean controllers should delay these notifications. Instead, the three parties (controllers, the ICO and law enforcement) should work together to assess the risk to the individuals.
The Guidance summarises the most common tactics, techniques and procedures (“TTPs”) threat actors use to gain access to IT systems and compromise data. It also provides steps organisations should take to mitigate against these.
The ICO considers the backup of personal data processed by an organisation as one of the most important controls in mitigating the risk to individuals arising from ransomware. Consequently, it notes that attackers often attempt to delete or encrypt backups. The Guidance recommends that controllers undertake a threat analysis of their backup solution to ensure their disaster recovery plan remains effective, considering the following questions:
It should be noted that these measures are already part of the NCSC’s Small Business Guide and its 10 Steps to Cyber Security, referenced above. Consequently, compliance with the “basic prevention” measures listed at the beginning of the Guidance will put controllers in a good position in relation to their disaster recovery preparedness. However, restoration from backups does not necessarily entitle controllers to consider the severity of the risk to individuals as “low” or “unlikely” to materialise, especially where there is known or suspected data exfiltration.
The Guidance states that the ICO supports law enforcement’s position to not encourage, endorse, nor condone the payment of ransom demands. Even where payment is made and the data restored or not disclosed publicly following exfiltration, the ICO is clear that it will still consider the cyber incident in itself as a breach of individuals’ data protection rights, such as transparency of processing and subject access rights.
The Guidance reminds readers of the terminology within the UK GDPR requiring organisations to implement “appropriate measures” to restore the data in the event of a disaster. The Guidance is clear that the ICO does not consider the payment of a ransom as an “appropriate measure” to restore personal data. Even if controllers pay the ransom, they should still presume that the data is compromised and take additional mitigating actions as required under Article 33 UK GDPR.
The Guidance highlights several methods of testing, assessing and evaluating an organisation’s appropriate measures, including:
To assist organisations with the above assessment process and enable them to evaluate their general preparedness for a ransomware attack, the ICO has also produced a 10-step checklist for controllers to utilise, encompassing all key issues discussed in the Guidance. The full text of the Guidance is available here.
London - Walbrook
+44 (0) 20 7894 6443
By Hans Allnutt, Astrid Hardy
By Patrick Hill, Sonali Malhotra
By Julian Miller, Clare Hughes-Williams
By Patrick Hill, Camilla Elliot
By Patrick Hill
By Hans Allnutt, Camilla Elliot
By Hans Allnutt, Stuart Hunt
By Julian Miller
By Astrid Hardy, Hans Allnutt
By Julian Miller, Tom Evans
By Jade Kowalski, Astrid Hardy
By Louise Gallagher, Katie Anderson