Published April 10, 2014 | Version v1
Journal article Open

How to Handle Breach Incidents Involving Personal Information

  • 1. scip AG

Contributors

Editor:

  • 1. scip AG

Description

Companies typically have sophisticated security incident procedures in place to handle all kinds of issues emerging from possible security events related to their IT environment. Many of those procedures do not consider the affected assets enough and are restricted to IT components. That’s why I have created a short overview on how to respond to and manage an information security incident with the primary focus on breach incidents involving Personal Information on paper or on IT systems.

Notes

This paper was written in 2014 as part of a research project at scip AG, Switzerland. It was initially published online at https://www.scip.ch/en/?labs.20140410 and is available in English and German. Providing our clients with innovative research for the information technology of the future is an essential part of our company culture.

Files

How to Handle Breach Incidents Involving Personal Information.pdf

Files (175.8 kB)