The revelations from the investigation conducted by the Milan Prosecutor’s Office and the investigative unit of the Carabinieri of Varese—exposing unlawful activities involving the acquisition of confidential, sensitive, and personal information—have dominated Italy’s political and public debate in recent hours. These developments call for serious reflection.
The Italian Data Protection Authority (Garante per la protezione dei dati personali) has responded by establishing an interdepartmental task force to promptly identify appropriate actions and implement stronger protections for databases. This task force aims, among other objectives, to define adequate technical and organizational security measures for database access by authorized personnel, as well as for the operations performed by those responsible for their management and maintenance.
As we await further updates, here’s what companies need to know and do in similar situations:
- Internal investigations, containment, and evaluation.
Upon discovering a data breach, it is critical to identify the incident, evaluate its scope and impact on personal data, and determine its cause to address any vulnerabilities. - Notification obligations.
- To the Data Protection Authority: Organizations must notify the breach to the Garante within 72 hours of becoming aware of it unless the breach is unlikely to pose a risk to the rights and freedoms of individuals.
- To the affected individuals: If the breach creates a high risk for the people involved, they must be informed without undue delay.
- Violation register.
Maintain a record of the breach, including its nature, effects, and corrective measures taken. This is essential for compliance and subsequent audits. - Implement corrective measures.
Take steps to enhance data security and prevent future breaches, such as revising security protocols and initiating employee training programs. - Review and update policies.
After addressing the breach, it is essential to review and strengthen the company’s data protection policies and response plans. - Continuous monitoring.
Activate systems to monitor data processes continuously to detect and respond to any future incidents promptly. - Training.
Security measures must be supported by proper employee training to ensure effective implementation in daily operations.
It is essential to emphasize that, if a data breach has occurred, pre-existing measures were insufficient and must be reassessed and enhanced. This is a fundamental goal of the Data Breach procedure.
As highlighted earlier, recent developments should prompt reflection. Information and data are increasingly valuable assets, and ensuring their technical and organizational security is a critical priority for businesses. Companies must view investments in advanced, continually updated security measures as vital, not optional. These efforts ultimately benefit business performance and corporate reputation.
Press Review: