Name of pattern: Data leak
Purpose: To establish the expected behavior in case of data leakage.
Usage:
There is a data leak of any size;
An invasion occurs in a system;
Some kind of data privacy violation occurs.
Example: The controller receives a notification of data leakage, either through a system previously developed to indicate breaches and possible security breaches or by another source of information. From the notification, it is necessary to take a set of actions to minimize this leak as well as inform the National Authority and the data subject about the leak.
Diagram: