Data breach:
Do you have the required protocol ready in place when a data breach has occurred?
Data breach
The data breach protocol includes: • incident procedure for follow-up on an information security incident and in particular of a data breach of personal data • infringement report in the event of a data breach • logbook with evaluation (lessons learned and mitigation measures)