Handling Data Breaches
Identification
We will deploy a set to tools Or use services provided by the providers to detect data breaches.
Analysis
When a data breach is detected, the person designated to handle security will analyze the incidence.
DocumentationÂ
Documentation will be prepared containing analysis of incidence and impact assessment.
Reporting
Depending upon the severity of breach and data impacted, the incidence will be reported to all concerned, including the impacted users.
Corrective actions
Based on analysis of incidence, appropriate actions will be taken to prevent the repeat of such actions in future.