{"id":11908,"date":"2022-11-21T01:58:03","date_gmt":"2022-11-20T23:58:03","guid":{"rendered":"https:\/\/azlp.mk\/controllers\/directions\/10-quick-steps-to-comply-with-the-personal-data-protection-law\/8-create-a-plan-with-a-personal-data-breach-scenario\/"},"modified":"2022-12-03T10:11:08","modified_gmt":"2022-12-03T08:11:08","slug":"8-create-a-plan-with-a-personal-data-breach-scenario","status":"publish","type":"page","link":"https:\/\/azlp.mk\/en\/controllers\/directions\/10-quick-steps-to-comply-with-the-personal-data-protection-law\/8-create-a-plan-with-a-personal-data-breach-scenario\/","title":{"rendered":"8. Create a plan with a personal data breach scenario"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"background-color: #f2f2f2;background-position: center center;background-repeat: no-repeat;border-width: 0px 0px 0px 0px;border-color:#eae9e9;border-style:solid;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-0 fusion_builder_column_inner_1_2 1_2 fusion-flex-column\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-text fusion-text-1\"><p>In the event of a violation of the security of personal data, you must immediately, and no later than 72 hours after you learned about the violation, notify the Agency for the Protection of Personal Data at <a href=\"mailto:Incident@privacy.mk\">incident@privacy.mk<\/a> or <a href=\"https:\/\/eprijavi.privacy.mk\/\">https:\/\/eprijavi.privacy.mk\/<\/a> .<\/p>\n<p>If you do not have the opportunity to notify the Personal Data Protection Agency within 72 hours, you can submit the notification gradually, without further unnecessary delay. This obligation does not apply in cases where there is no probability that the violation of the security of personal data will result in a high risk for the rights and freedoms of natural persons.<\/p>\n<\/div><\/div><style type=\"text\/css\">.fusion-body .fusion-builder-nested-column-0{width:50% !important;margin-top : 0px;margin-bottom : 20px;}.fusion-builder-nested-column-0 > .fusion-column-wrapper {padding-top : 0px !important;padding-right : 0px !important;margin-right : 3.84%;padding-bottom : 0px !important;padding-left : 0px !important;margin-left : 3.84%;}@media only screen and (max-width:1024px) {.fusion-body .fusion-builder-nested-column-0{width:50% !important;order : 0;}.fusion-builder-nested-column-0 > .fusion-column-wrapper {margin-right : 3.84%;margin-left : 3.84%;}}@media only screen and (max-width:640px) {.fusion-body .fusion-builder-nested-column-0{width:100% !important;order : 0;}.fusion-builder-nested-column-0 > .fusion-column-wrapper {margin-right : 1.92%;margin-left : 1.92%;}}<\/style><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-1 fusion_builder_column_inner_1_2 1_2 fusion-flex-column\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;background-color:rgba(195,215,216,0.95);padding: 0px 0px 0px 0px;\"><div class=\"fusion-text fusion-text-2\"><h4><strong>Example:<\/strong><\/h4>\n<p>A municipality announces a call for support to associations that provide assistance to the elderly and infirm. Several associations applied for the call, and several of them managed to get financial support from the municipality for their activities.<\/p>\n<p>When the municipality notified the associations that received support (via e-mail), it accidentally put the contacts of all associations in the carbon copy (cc:) section instead of the blind copy (bcc:) section, which would have prevented disclosure of personal information. data of unauthorized persons.<\/p>\n<p>Although this represents an injury, there is no great risk for natural persons (several e-mail addresses contained the name of the contact person from the relevant association, but the content of the message was not confidential\/sensitive), so this kind of incident should not be reported to the Agency for protection of personal data.<\/p>\n<p>The municipality has documented this breach of personal data security, including the facts and effects of the event, as well as the corrective actions it has taken.<\/p>\n<\/div><\/div><style type=\"text\/css\">.fusion-body .fusion-builder-nested-column-1{width:50% !important;margin-top : 0px;margin-bottom : 20px;}.fusion-builder-nested-column-1 > .fusion-column-wrapper {padding-top : 0px !important;padding-right : 0px !important;margin-right : 3.84%;padding-bottom : 0px !important;padding-left : 0px !important;margin-left : 3.84%;}@media only screen and (max-width:1024px) {.fusion-body .fusion-builder-nested-column-1{width:50% !important;order : 0;}.fusion-builder-nested-column-1 > .fusion-column-wrapper {margin-right : 3.84%;margin-left : 3.84%;}}@media only screen and (max-width:640px) {.fusion-body .fusion-builder-nested-column-1{width:100% !important;order : 0;}.fusion-builder-nested-column-1 > .fusion-column-wrapper {margin-right : 1.92%;margin-left : 1.92%;}}<\/style><\/div><\/div><\/div><style type=\"text\/css\">.fusion-body .fusion-builder-column-0{width:100% !important;margin-top : 0px;margin-bottom : 20px;}.fusion-builder-column-0 > .fusion-column-wrapper {padding-top : 0px !important;padding-right : 0px !important;margin-right : 1.92%;padding-bottom : 0px !important;padding-left : 0px !important;margin-left : 1.92%;}@media only screen and (max-width:1024px) {.fusion-body .fusion-builder-column-0{width:100% !important;order : 0;}.fusion-builder-column-0 > .fusion-column-wrapper {margin-right : 1.92%;margin-left : 1.92%;}}@media only screen and (max-width:640px) {.fusion-body .fusion-builder-column-0{width:100% !important;order : 0;}.fusion-builder-column-0 > .fusion-column-wrapper {margin-right : 1.92%;margin-left : 1.92%;}}<\/style><\/div><\/div><style type=\"text\/css\">.fusion-body .fusion-flex-container.fusion-builder-row-1{ padding-top : 0px;margin-top : 0px;padding-right : 0px;padding-bottom : 0px;margin-bottom : 0px;padding-left : 0px;}<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":6,"featured_media":0,"parent":11478,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>8. Create a plan with a personal data breach scenario - \u0410\u0433\u0435\u043d\u0446\u0438\u0458\u0430 \u0437\u0430 \u0437\u0430\u0448\u0442\u0438\u0442\u0430 \u043d\u0430 \u043b\u0438\u0447\u043d\u0438\u0442\u0435 \u043f\u043e\u0434\u0430\u0442\u043e\u0446\u0438<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/azlp.mk\/en\/controllers\/directions\/10-quick-steps-to-comply-with-the-personal-data-protection-law\/8-create-a-plan-with-a-personal-data-breach-scenario\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"8. Create a plan with a personal data breach scenario - \u0410\u0433\u0435\u043d\u0446\u0438\u0458\u0430 \u0437\u0430 \u0437\u0430\u0448\u0442\u0438\u0442\u0430 \u043d\u0430 \u043b\u0438\u0447\u043d\u0438\u0442\u0435 \u043f\u043e\u0434\u0430\u0442\u043e\u0446\u0438\" \/>\n<meta property=\"og:url\" content=\"https:\/\/azlp.mk\/en\/controllers\/directions\/10-quick-steps-to-comply-with-the-personal-data-protection-law\/8-create-a-plan-with-a-personal-data-breach-scenario\/\" \/>\n<meta property=\"og:site_name\" content=\"\u0410\u0433\u0435\u043d\u0446\u0438\u0458\u0430 \u0437\u0430 \u0437\u0430\u0448\u0442\u0438\u0442\u0430 \u043d\u0430 \u043b\u0438\u0447\u043d\u0438\u0442\u0435 \u043f\u043e\u0434\u0430\u0442\u043e\u0446\u0438\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-03T08:11:08+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/azlp.mk\/en\/controllers\/directions\/10-quick-steps-to-comply-with-the-personal-data-protection-law\/8-create-a-plan-with-a-personal-data-breach-scenario\/\",\"url\":\"https:\/\/azlp.mk\/en\/controllers\/directions\/10-quick-steps-to-comply-with-the-personal-data-protection-law\/8-create-a-plan-with-a-personal-data-breach-scenario\/\",\"name\":\"8. Create a plan with a personal data breach scenario - \u0410\u0433\u0435\u043d\u0446\u0438\u0458\u0430 \u0437\u0430 \u0437\u0430\u0448\u0442\u0438\u0442\u0430 \u043d\u0430 \u043b\u0438\u0447\u043d\u0438\u0442\u0435 \u043f\u043e\u0434\u0430\u0442\u043e\u0446\u0438\",\"isPartOf\":{\"@id\":\"https:\/\/azlp.mk\/#website\"},\"datePublished\":\"2022-11-20T23:58:03+00:00\",\"dateModified\":\"2022-12-03T08:11:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/azlp.mk\/en\/controllers\/directions\/10-quick-steps-to-comply-with-the-personal-data-protection-law\/8-create-a-plan-with-a-personal-data-breach-scenario\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/azlp.mk\/en\/controllers\/directions\/10-quick-steps-to-comply-with-the-personal-data-protection-law\/8-create-a-plan-with-a-personal-data-breach-scenario\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/azlp.mk\/en\/controllers\/directions\/10-quick-steps-to-comply-with-the-personal-data-protection-law\/8-create-a-plan-with-a-personal-data-breach-scenario\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/azlp.mk\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Controllers\",\"item\":\"https:\/\/azlp.mk\/en\/controllers\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Directions\",\"item\":\"https:\/\/azlp.mk\/en\/controllers\/directions\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"10 quick steps to comply with the Personal Data Protection Law\",\"item\":\"https:\/\/azlp.mk\/en\/controllers\/directions\/10-quick-steps-to-comply-with-the-personal-data-protection-law\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"8. Create a plan with a personal data breach scenario\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/azlp.mk\/#website\",\"url\":\"https:\/\/azlp.mk\/\",\"name\":\"\u0410\u0433\u0435\u043d\u0446\u0438\u0458\u0430 \u0437\u0430 \u0437\u0430\u0448\u0442\u0438\u0442\u0430 \u043d\u0430 \u043b\u0438\u0447\u043d\u0438\u0442\u0435 \u043f\u043e\u0434\u0430\u0442\u043e\u0446\u0438\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/azlp.mk\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"8. Create a plan with a personal data breach scenario - \u0410\u0433\u0435\u043d\u0446\u0438\u0458\u0430 \u0437\u0430 \u0437\u0430\u0448\u0442\u0438\u0442\u0430 \u043d\u0430 \u043b\u0438\u0447\u043d\u0438\u0442\u0435 \u043f\u043e\u0434\u0430\u0442\u043e\u0446\u0438","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/azlp.mk\/en\/controllers\/directions\/10-quick-steps-to-comply-with-the-personal-data-protection-law\/8-create-a-plan-with-a-personal-data-breach-scenario\/","og_locale":"en_US","og_type":"article","og_title":"8. Create a plan with a personal data breach scenario - \u0410\u0433\u0435\u043d\u0446\u0438\u0458\u0430 \u0437\u0430 \u0437\u0430\u0448\u0442\u0438\u0442\u0430 \u043d\u0430 \u043b\u0438\u0447\u043d\u0438\u0442\u0435 \u043f\u043e\u0434\u0430\u0442\u043e\u0446\u0438","og_url":"https:\/\/azlp.mk\/en\/controllers\/directions\/10-quick-steps-to-comply-with-the-personal-data-protection-law\/8-create-a-plan-with-a-personal-data-breach-scenario\/","og_site_name":"\u0410\u0433\u0435\u043d\u0446\u0438\u0458\u0430 \u0437\u0430 \u0437\u0430\u0448\u0442\u0438\u0442\u0430 \u043d\u0430 \u043b\u0438\u0447\u043d\u0438\u0442\u0435 \u043f\u043e\u0434\u0430\u0442\u043e\u0446\u0438","article_modified_time":"2022-12-03T08:11:08+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/azlp.mk\/en\/controllers\/directions\/10-quick-steps-to-comply-with-the-personal-data-protection-law\/8-create-a-plan-with-a-personal-data-breach-scenario\/","url":"https:\/\/azlp.mk\/en\/controllers\/directions\/10-quick-steps-to-comply-with-the-personal-data-protection-law\/8-create-a-plan-with-a-personal-data-breach-scenario\/","name":"8. Create a plan with a personal data breach scenario - \u0410\u0433\u0435\u043d\u0446\u0438\u0458\u0430 \u0437\u0430 \u0437\u0430\u0448\u0442\u0438\u0442\u0430 \u043d\u0430 \u043b\u0438\u0447\u043d\u0438\u0442\u0435 \u043f\u043e\u0434\u0430\u0442\u043e\u0446\u0438","isPartOf":{"@id":"https:\/\/azlp.mk\/#website"},"datePublished":"2022-11-20T23:58:03+00:00","dateModified":"2022-12-03T08:11:08+00:00","breadcrumb":{"@id":"https:\/\/azlp.mk\/en\/controllers\/directions\/10-quick-steps-to-comply-with-the-personal-data-protection-law\/8-create-a-plan-with-a-personal-data-breach-scenario\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/azlp.mk\/en\/controllers\/directions\/10-quick-steps-to-comply-with-the-personal-data-protection-law\/8-create-a-plan-with-a-personal-data-breach-scenario\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/azlp.mk\/en\/controllers\/directions\/10-quick-steps-to-comply-with-the-personal-data-protection-law\/8-create-a-plan-with-a-personal-data-breach-scenario\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/azlp.mk\/en\/"},{"@type":"ListItem","position":2,"name":"Controllers","item":"https:\/\/azlp.mk\/en\/controllers\/"},{"@type":"ListItem","position":3,"name":"Directions","item":"https:\/\/azlp.mk\/en\/controllers\/directions\/"},{"@type":"ListItem","position":4,"name":"10 quick steps to comply with the Personal Data Protection Law","item":"https:\/\/azlp.mk\/en\/controllers\/directions\/10-quick-steps-to-comply-with-the-personal-data-protection-law\/"},{"@type":"ListItem","position":5,"name":"8. Create a plan with a personal data breach scenario"}]},{"@type":"WebSite","@id":"https:\/\/azlp.mk\/#website","url":"https:\/\/azlp.mk\/","name":"\u0410\u0433\u0435\u043d\u0446\u0438\u0458\u0430 \u0437\u0430 \u0437\u0430\u0448\u0442\u0438\u0442\u0430 \u043d\u0430 \u043b\u0438\u0447\u043d\u0438\u0442\u0435 \u043f\u043e\u0434\u0430\u0442\u043e\u0446\u0438","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/azlp.mk\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/azlp.mk\/en\/wp-json\/wp\/v2\/pages\/11908"}],"collection":[{"href":"https:\/\/azlp.mk\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/azlp.mk\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/azlp.mk\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/azlp.mk\/en\/wp-json\/wp\/v2\/comments?post=11908"}],"version-history":[{"count":8,"href":"https:\/\/azlp.mk\/en\/wp-json\/wp\/v2\/pages\/11908\/revisions"}],"predecessor-version":[{"id":11921,"href":"https:\/\/azlp.mk\/en\/wp-json\/wp\/v2\/pages\/11908\/revisions\/11921"}],"up":[{"embeddable":true,"href":"https:\/\/azlp.mk\/en\/wp-json\/wp\/v2\/pages\/11478"}],"wp:attachment":[{"href":"https:\/\/azlp.mk\/en\/wp-json\/wp\/v2\/media?parent=11908"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}