Skip to end of metadata
Go to start of metadata
- We will deploy a set to tools Or use services provided by the providers to detect data breaches.
- When a data breach is detected, the person designated to handle security will analyze the incidence.
- Documentation will be prepared containing analysis of incidence and impact assessment.
- Depending upon the severity of breach and data impacted, the incidence will be reported to all concerned, including the impacted users.
- Corrective actions
- Based on analysis of incidence, appropriate actions will be taken to prevent the repeat of such actions in future.