Expand | ||
---|---|---|
| ||
Does your organisation have a documented Incident Response Plan? We adopt a 5-stage approach to handling any incidents:
This includes recording of incidents in our Events, Incidents and Weaknesses Register. We aim to fix any production issues within the following time span: P1 - 4 hours P2 - 24 hours P3 - 48 hours P4 - prioritised accordingly on backlog More information: https://commonplace.atlassian.net/l/cp/BpNQjYy1 |
Expand | ||
---|---|---|
| ||
How does your service report any outages? Via email and where possible / relevant via a banner on the platform. More information: https://commonplace.atlassian.net/l/cp/DPDdno0n |
Expand | |||||
---|---|---|---|---|---|
| |||||
More information: https://commonplace.atlassian.net/l/cp/3VDbCHtp |
Expand | ||||
---|---|---|---|---|
| ||||
More information: https://commonplace.atlassian.net/l/cp/kc6eokqv |
Expand | ||
---|---|---|
| ||
Does your organisation have a process for employees, contractors, and suppliers to report suspected or known information security breaches and weaknesses? We log every data breach or suspected data breach. We track the date, severity and resolution. Upon becoming aware of a security incident an assessment must be made to understand if a data breach has occurred, and if so to what extent. The assessment is broken up into 2 stages: triage and investigation. The purpose of this is to ensure that appropriate mechanisms are in place to identify when a data breach has occurred with a proportional amount of resource. The objectives of this procedure are:
We also have a guidance document as part of our Information Security Management System.https://commonplace.atlassian.net/l/cp/3w860NLJ |
Expand | ||
---|---|---|
| ||
Does your organisation have a process for reporting information security breaches that affect your clients to them in a timely manner? Upon becoming aware of a security incident an assessment must be made to understand if a data breach has occurred, and if so to what extent. The assessment is broken up into 2 stages: triage and investigation. The purpose of this is to ensure that appropriate mechanisms are in place to identify when a data breach has occurred with a proportional amount of resource. The objectives of this procedure are:
We also have a guidance document as part of our Information Security Management System. | ||
Expand | ||
---|---|---|
| ||
Does your organisation conduct a root cause analysis for all information security incidents that are reported? Yes. We adopt a 5-stage approach to handling any incidents:
| ||
Expand | ||
---|---|---|
| ||
Does your organisation have an approved Business Continuity Plan to ensure the continuity of service in a disaster? Yes, a copy of the Business Continuity Plan is available upon request from customers@commonplace.ishttps://commonplace.atlassian.net/l/cp/ZJmw59S2 |