Incident Response Process. The information security incident management program must be documented, tested, updated as needed, reviewed, and approved, with management oversight, on a periodic basis. The incident management policy and procedures must include prioritization, roles and responsibilities, procedures for escalation (internal) and notification, tracking and reporting, containment and remediation, and preservation of data to maintain forensic integrity.
Incident Response Process a. Acuity maintains a record of security breaches with a description of the breach, the time period, the consequences of the breach, the name of the reporter, and to whom the breach was reported, and the procedure for recovering data.
Incident Response Process. A. Microsoft maintains a record of security incidents with a description of the breach, the time period, the consequences of the incident, the name of the reporter, and to whom the incident was reported, and the procedure for recovering data, if applicable.
B. Microsoft tracks disclosures of Customer Data, including what data has been disclosed, to whom, and at what time.
Incident Response Process. Spotify’s response to an Information Security Incidents consists of three phases, as follows:
Incident Response Process. IBM maintains a record of security breaches with a description of the breach, the time period, the consequences of the breach, the name of the reporter, and to whom the breach was reported, and the procedure for recovering data.
Incident Response Process. Talend maintains a record of security breaches which includes a description of the breach, the time period, the consequences of the breach, the context surrounding the report of the breach, and the mitigation measures taken as a result of the breach. For each security breach that is a Security Incident, notification by Talend to the Customer (as described in the “Security Incident” section above) will be made without undue delay.
Incident Response Process. Identification Phase
Incident Response Process. PartnerTap maintains a record of security breaches which includes a description of the breach, the time period, the consequences of the breach, the context surrounding the report of the breach, and the mitigation measures taken as a result of the breach. For each security breach that is a Security Incident, notification by PartnerTap according to federal, state, local legislation and contractual obligations.
Incident Response Process i. Provider shall maintain a record of Security Incidents noting the description of the Security Incident, the applicable time periods, the impact, the person reporting and to whom the Security Incident was reported, and the procedures to remediate the incident.
ii. In the event of a Security Incident identified by Provider, Accenture, or other third party, Provider will: (a) promptly investigate the Security Incident; (b) promptly provide Accenture with all relevant detailed information as reasonably requested by Accenture about the Security Incident; and (c) take reasonable steps to mitigate the effects and to minimize any damage resulting from the Security Incident.
iii. The Provider shall track disclosures of Accenture Data, including what type of data was disclosed, to whom, and the time of the disclosure.
Incident Response Process. A. CloudBlue has an established process for security incident response and a trained team.
B. CloudBlue has established communication protocols which are embedded in the incident response plan.