...
Expand | ||
---|---|---|
| ||
Does your organisation have robust detection, investigation and reporting procedures in place for personal data breaches, including maintaining a record of all personal data breaches? We log every data breach or suspected data breach. We track the date, severity and resolution. Upon becoming aware of a security incident an assessment must be made to understand if a data breach has occurred, and if so to what extent. The assessment is broken up into 2 stages: triage and investigation. The purpose of this is to ensure that appropriate mechanisms are in place to identify when a data breach has occurred with a proportional amount of resource. The objectives of this procedure are:
We also have a guidance document as part of our Information Security Management System. More information: https://commonplace.atlassian.net/l/cp/qQevr3Wm |
Expand | ||
---|---|---|
| ||
Does your organisation have a process for notifying the relevant Authority and all relevant parties (e.g. data controllers) when a breach occurs? Yes. XXXXX |
...