1. Identification
    1. We will deploy a set to tools Or use services provided by the providers to detect data breaches.
  2. Analysis
    1. When a data breach is detected, the person designated to handle security will analyze the incidence.
  3. Documentation 
    1. Documentation will be prepared containing analysis of incidence and impact assessment.
  4. Reporting
    1. Depending upon the severity of breach and data impacted, the incidence will be reported to all concerned, including the impacted users.
  5. Corrective actions
    1. Based on analysis of incidence, appropriate actions will be taken to prevent the repeat of such actions in future.