...
Expand | ||
---|---|---|
| ||
Does your organisation have a process for employees, contractors, and suppliers to report suspected or known information security breaches and weaknesses? We log every data breach or suspected data breach. We track the date, severity and resolution. Upon becoming aware of a security incident an assessment must be made to understand if a data breach has occurred, and if so to what extent. The assessment is broken up into 2 stages: triage and investigation. The purpose of this is to ensure that appropriate mechanisms are in place to identify when a data breach has occurred with a proportional amount of resource. The objectives of this procedure are:
We also have a guidance document as part of our Information Security Management System. More information: https://commonplace.atlassian.net/l/cp/3w860NLJ |
Expand | ||
---|---|---|
| ||
Does your organisation have a process for reporting information security breaches that affect your clients to them in a timely manner? Upon becoming aware of a security incident an assessment must be made to understand if a data breach has occurred, and if so to what extent. The assessment is broken up into 2 stages: triage and investigation. The purpose of this is to ensure that appropriate mechanisms are in place to identify when a data breach has occurred with a proportional amount of resource. The objectives of this procedure are:
We also have a guidance document as part of our Information Security Management System. |
...