Effective Date: October 29, 2025 Last Updated: October 29, 2025
1. Purpose
This procedure defines how Quesma Poland Sp. z o.o. detects, assesses, responds to, and notifies affected parties about data breaches involving personal data.
This procedure ensures compliance with:
- GDPR Article 33 (Notification to supervisory authority)
- GDPR Article 34 (Communication to data subjects)
- Polish data protection laws
- Partner and customer contractual requirements
2. Scope
This procedure applies to any breach of security leading to:
- Accidental or unlawful destruction of personal data
- Loss, alteration, or unauthorized disclosure of personal data
- Unauthorized access to personal data
Personal data in scope:
- Website visitor data (analytics, IP addresses in logs)
- Newsletter subscriber email addresses
- Contact form submissions and email communications
- Business contact information (partners, customers, vendors)
3. Definitions
Personal Data Breach: A breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data.
Data Controller: Quesma Poland Sp. z o.o. (we determine the purposes and means of processing)
Data Processor: Third-party services that process data on our behalf (Google Analytics, Cloudflare, Mailchimp, Google Workspace)
Supervisory Authority: Urząd Ochrony Danych Osobowych (UODO) - Polish data protection authority
4. Breach Detection
4.1 How Breaches May Be Discovered
- Automated alerts: Security monitoring systems (Cloudflare, hosting provider)
- System logs: Unusual access patterns or failed login attempts
- Third-party notification: Vendor reports breach affecting our data
- Team member report: Employee notices suspicious activity
- External report: Security researcher or user reports vulnerability
- Customer inquiry: Questions about unexpected data access
4.2 Reporting a Suspected Breach
Any team member who suspects a breach must immediately report to:
Primary Contact: [email protected] (DPO - Jacek Migdal)
Do not delay. Even if uncertain, report suspicious activity immediately.
5. Breach Assessment and Response
5.1 Immediate Actions (Within 24 Hours)
Step 1: Containment
- Stop the breach if ongoing (e.g., disable compromised account, block access)
- Preserve evidence (logs, screenshots, communications)
- Do not delete or modify logs without documenting them first
Step 2: Initial Assessment
- What personal data was affected?
- How many individuals are affected?
- How did the breach occur?
- Is the breach ongoing or contained?
Step 3: Assemble Response Team
- Data Protection Officer (DPO) leads response
- Relevant technical staff (whoever manages affected system)
- CEO/management (if significant breach)
- Legal counsel (if complex or high-risk)
Step 4: Document Everything
- Create incident log with timeline
- Record all actions taken
- Save all evidence securely
5.2 Detailed Investigation (Within 72 Hours)
Determine Breach Details:
-
What data was compromised?
- Types of personal data (emails, names, analytics data, etc.)
- Volume of data (number of records)
- Sensitivity of data (low, medium, high risk)
-
Who is affected?
- Identify specific individuals if possible
- Estimate number if exact count unavailable
-
How did it happen?
- Root cause analysis
- What vulnerability or error led to breach?
- Was it malicious or accidental?
-
What are the consequences?
- Risk to individuals (identity theft, financial loss, privacy impact)
- Likelihood of harm (low, medium, high)
- Severity of harm (minor, moderate, severe)
Risk Assessment:
- Low risk: Unlikely to result in harm to individuals (e.g., temporary website outage, no data exposed)
- Medium risk: May result in some inconvenience or concern (e.g., email list temporarily accessible)
- High risk: Likely to result in significant harm (e.g., passwords exposed, financial data compromised)
6. Notification Requirements
6.1 Notification to Supervisory Authority (GDPR Article 33)
When required:
- Breach is likely to result in a risk to individuals’ rights and freedoms
- Must notify unless breach is “unlikely to result in a risk”
Deadline: Within 72 hours of becoming aware of the breach
Where to notify: Urząd Ochrony Danych Osobowych (UODO) ul. Stawki 2, 00-193 Warszawa, Poland Website: https://uodo.gov.pl/
What to include:
- Nature of the breach (what happened)
- Categories and approximate number of data subjects affected
- Categories and approximate number of personal data records concerned
- Contact point for more information (DPO: [email protected])
- Likely consequences of the breach
- Measures taken or proposed to address the breach and mitigate harm
If information unavailable within 72 hours:
- Submit initial notification with available information
- Provide remaining information in phases as it becomes available
- Document reasons for delay
6.2 Notification to Data Subjects (GDPR Article 34)
When required:
- Breach is likely to result in a high risk to individuals’ rights and freedoms
- Not required if:
- Appropriate technical protections were in place (e.g., encryption)
- Measures taken to ensure no longer high risk (e.g., password reset forced)
- Would involve disproportionate effort (can use public communication instead)
Deadline: Without undue delay (as soon as reasonably possible)
How to notify:
- Email to affected individuals (if email addresses available and not compromised)
- Public notice on website (if large-scale breach or email compromised)
- Direct communication (phone, mail) if appropriate
What to include:
- Nature of the breach in clear, plain language
- Contact point for more information (DPO: [email protected])
- Likely consequences of the breach
- Measures taken or proposed to mitigate harm
- Recommended actions for individuals (e.g., change passwords, monitor accounts)
6.3 Notification to Partners and Customers
When required:
- Breach affects data we process on behalf of partners or customers
- Contractual obligations require notification
- Partner/customer needs to take action to protect their users
Deadline:
- Within 48 hours of discovery (or as specified in contract)
- Earlier notification if immediate action required
How to notify:
- Email to designated contact
- Follow partner’s/customer’s preferred notification procedure
- Provide sufficient detail for them to assess impact
6.4 Notification from Third-Party Processors
If vendor notifies us of breach:
- Assess if our data or our users’ data is affected
- Follow same notification procedures above if applicable
- Document vendor breach in incident log
- Review vendor relationship and security practices
7. Remediation and Prevention
7.1 Immediate Remediation
- Fix the vulnerability or issue that caused the breach
- Implement temporary safeguards if permanent fix takes time
- Reset passwords or revoke access as appropriate
- Enhance monitoring to detect similar incidents
7.2 Root Cause Analysis
- Investigate how and why breach occurred
- Identify contributing factors (technical, organizational, human error)
- Document findings in incident report
7.3 Preventive Measures
- Implement controls to prevent recurrence
- Update policies and procedures as needed
- Provide additional training to team if needed
- Consider security enhancements (MFA, encryption, monitoring)
7.4 Post-Incident Review
- Conduct lessons-learned session with response team
- Update this procedure based on experience
- Share appropriate learnings with team (without compromising sensitive details)
8. Documentation and Record-Keeping
8.1 Breach Log
Maintain a log of all breaches (required by GDPR Article 33(5)):
- Date and time of breach discovery
- Nature of breach
- Data affected
- Number of individuals affected
- Consequences of breach
- Remediation actions taken
- Notifications sent
Retention: Keep breach records for at least 3 years
8.2 Incident Report
For each breach, create detailed incident report including:
- Timeline of events
- Root cause analysis
- Impact assessment
- Notifications sent (copies)
- Remediation actions
- Preventive measures implemented
Reports are stored securely and made available for supervisory authority inspection.
9. Roles and Responsibilities
Data Protection Officer (DPO):
- Lead breach response and investigation
- Decide on notification requirements
- Communicate with supervisory authority
- Coordinate with technical and legal teams
CEO/Management:
- Support DPO with resources and authority
- Approve high-risk decisions (public notifications, legal actions)
- Communicate with media if necessary
Technical Team:
- Contain and remediate technical aspects of breach
- Preserve and analyze logs and evidence
- Implement security fixes
- Support DPO with technical assessment
All Team Members:
- Report suspected breaches immediately
- Preserve evidence if they discover breach
- Follow instructions from DPO during incident response
- Maintain confidentiality of incident details
10. Communication Guidelines
Internal Communication:
- Keep incident details confidential (need-to-know basis)
- Do not discuss on public channels unless secure
- Use dedicated incident response channel or private communications
External Communication:
- All external communications coordinated by DPO
- Consistent messaging across all channels
- Transparent and honest, but avoid unnecessary technical details
- Focus on what happened, impact, and what we’re doing about it
Media Inquiries:
- Direct to CEO or designated spokesperson
- Prepared statement approved by DPO and legal counsel
11. Contact Information
Data Protection Officer: Jacek Migdal, CEO Email: [email protected] Company: Quesma Poland Sp. z o.o. Address: ul. Lindleya 16, 02-013 Warszawa, Poland
Polish Supervisory Authority (UODO): https://uodo.gov.pl/
12. Training and Testing
Annual Training:
- All team members trained on breach detection and reporting
- Response team drills breach response procedure
- Update procedure based on drills and real incidents
Procedure Review:
- Annual review of this procedure
- Update after any actual breach incident
- Update when regulations or business practices change
Quick Reference: Breach Response Checklist
Immediate (0-24 hours):
- Contain the breach
- Preserve evidence
- Notify DPO ([email protected])
- Assemble response team
- Start incident log
Assessment (24-72 hours):
- Determine what data was affected
- Identify number of individuals affected
- Assess risk level (low, medium, high)
- Determine notification requirements
Notification (within 72 hours if required):
- Notify supervisory authority (UODO) if required
- Notify data subjects if high risk
- Notify partners/customers if affected
- Document all notifications
Remediation (ongoing):
- Fix the vulnerability
- Implement preventive measures
- Conduct root cause analysis
- Update policies and procedures
- Complete incident report