Free ebook: NIS2 ready using ISO 27001 best practices
Download ebook

Disciplinary process for security breaches

Critical
High
Normal
Low

Our organization has defined the actions to be taken in the event of a breach of confidentiality. These may include e.g. the following steps:

  • investigating what data was breached and how harmful this was
  • investigating the intentionality of the act
  • investigating what was set as conseguence on the confidentiality agreement
  • deciding whether and how to proceed (e.g. legal actions)
  • deciding whether outside assistance is needed
Connected other frameworks and requirements:
7.2.3: Disciplinary process
ISO 27001
PR.IP-11: Cybersecurity in human resources
NIST CSF
6.4: Disciplinary process
ISO 27001
5.28: Collection of evidence
ISO 27001
7.3: Awareness
ISO 27001
No items found.