DATA BREACH & INCIDENT MANAGEMENT

1

DATA BREACH & INCIDENT MANAGEMENT

CYBER INCIDENTS & DATA BREACH REGISTRY

Document and maintain a detailed registry and history of data breaches and incidents as required from Data Privacy and Cybersecurity regulations.

2

REPORT TO THE AUTHORITY OR NOT?

Reporting a data breach incident to the Data Protection Authority or even to the potentially affected individuals (data subjects) is a significant task. Assess the need to inform the Data Protection Authority (DPA) or the affected individuals using Enactia’s quick check mechanism.

Reporting Data Breach to Authority

3

Incident Reporting Mechanism

ON-TIME INCIDENT REPORTING

Keep track and be alerted on time in order to report a data breach as required by Data Protection and Cybersecurity requirements and regulations (i.e. reporting a data breach within 72 hours).

4

DATA PROTECTION AUTHORITY REPORT PREPARATION

Create data breach notification reports and keep a detailed history (Versioning) of all notifications made for a specific data breach to the Data Protection Authority (DPA) or to the affected individuals (data subjects).

Data Protection Authority Versioned Report Preparation

5

Customized DPA Notification Templates

DPA NOTIFICATION TEMPLATES OR BUILD-YOUR-OWN

Cybersecurity and privacy professionals can use existing templates or create their own DPA Notifications templates in the forms of questionnaires and provide the key indicators of the compliance level for the organization. Enactia, being a multi-user platform, allows others from within the organization to log in and answer questions that have been assigned to them. The dashboard gives a complete picture of the status of all DPA notification reports.

6

CENTRAL REPOSITORY FOR MAINTAINING INCIDENT RELATED DOCUMENTS

CENTRAL REPOSITORY FOR MAINTAINING INCIDENT RELATED DOCUMENTS

Keep Incident relevant documentation and investigation reports in a central repository (such as responses received from the data protection authority, communication approach to affected data subjects, incident investigation reports and much more).

7

TASK MANAGEMENT FOR CYBER INCIDENTS & DATA BREACHES

TASK MANAGEMENT FOR CYBER INCIDENTS & DATA BREACHES

Assign tasks to your colleagues in order to monitor and coordinate the incident/data breach investigation (marketing, communications, internal audit, forensic experts, IT department, legal, etc.).

8

LINKING DATA BREACHES & CYBER INCIDENTS TO RPAs

In case of a data breach, it is important to recognize which processes may have been affected. Enactia allows you to map certain data breaches to specific data processing activities and at the same time, you will be able to recognize which are the affected data assets and the respective Personal Identifiable Information (PII).

LINKING DATA BREACHES & CYBER INCIDENTS TO RPAs

2000+

ASSESSMENTS

Completed via Enactia Cloud Platform

4000+

RISKS GENERATED

From completed Enactia privacy assessments.

500+

DATA FIELDS

Unique data fields and features .

9000+

HOURS SPENT

Hours Spent in R&D for the development of the Enactia Platform.

Take a look at the pricing
and subscription options

© Enactia Ltd