Identify. Identify the scope of the alleged breach and take initial steps to contain the damage (this may involve determining whether the privacy breach would allow unauthorized access to an electronic information system).
Appears in 4 contracts
Samples: www.llbc.leg.bc.ca, www.llbc.leg.bc.ca, www2.gov.bc.ca