Managing security breaches

Data Privacy offers a framework for managing potential and actual security breach issues. It consists of the following elements:

Workflows

The workflows help you to:

  1. Log a potential security breach.
    If someone suspects a potential breach, it has to be logged and investigated.
  2. Investigate any potential security breaches that have been logged.
    Not every potential breach is an actual breach. Some potential breaches are the result of other breaches.
  3. Report actual security breaches to the appropriate stakeholders.
    During the workflow, users are prompted to add evidence of notification to the Supervisory Authority. Such evidence is added as attachments in the Files tab, where you can add more files at any time.