Expand | ||
---|---|---|
| ||
Does your organisation have a documented Incident Response Plan? We adopt a 5-stage approach to handling any incidents:
This includes recording of incidents in our Events, Incidents and Weaknesses Register. We aim to fix any production issues within the following time span: P1 - 4 hours P2 - 24 hours P3 - 48 hours P4 - prioritised accordingly on backlog More information: https://commonplace.atlassian.net/l/cp/BpNQjYy1 |
Expand | ||
---|---|---|
| ||
How does your service report any outages? Via email and where possible / relevant via a banner on the platform. More information: https://commonplace.atlassian.net/l/cp/DPDdno0n |
Expand | |||||
---|---|---|---|---|---|
| |||||
More information: https://commonplace.atlassian.net/l/cp/3VDbCHtp |
Expand | ||||
---|---|---|---|---|
| ||||
More information: https://commonplace.atlassian.net/l/cp/kc6eokqv |
Expand | |||||
---|---|---|---|---|---|
| We log every data breach or suspected data breach. We track the date, severity and resolution.|||||
Upon becoming aware of a security incident an assessment must be made to understand if a data breach has occurred, and if so to what extent. The assessment is broken up into 2 stages: triage and investigation. The purpose of this is to ensure that appropriate mechanisms are in place to identify when a data breach has occurred with a proportional amount of resource. The objectives of this procedure are:
We also have a guidance document as part of our Information Security Management System. More information: https://commonplace.atlassian.net/l/cp/3w860NLJ |
Expand | ||
---|---|---|
| ||
Does your organisation have a process for reporting information security breaches that affect your clients to them in a timely manner? Upon becoming aware of a security incident an assessment must be made to understand if a data breach has occurred, and if so to what extent. The assessment is broken up into 2 stages: triage and investigation. The purpose of this is to ensure that appropriate mechanisms are in place to identify when a data breach has occurred with a proportional amount of resource. The objectives of this procedure are:
We also have a guidance document as part of our Information Security Management System.https://commonplace.atlassian.net/l/cp/HA42vqEX |
Expand | ||
---|---|---|
| ||
Does your organisation conduct a root cause analysis for all information security incidents that are reported? Yes. We adopt a 5-stage approach to handling any incidents:
| ||
Expand | ||
---|---|---|
| ||
Does your organisation have an approved Business Continuity Plan to ensure the continuity of service in a disaster? Yes, a copy of the Business Continuity Plan is available upon request from customers@commonplace.ishttps://commonplace.atlassian.net/l/cp/ZJmw59S2 |