Published April 10, 2014
| Version v1
Journal article
Open
How to Handle Breach Incidents Involving Personal Information
Description
Companies typically have sophisticated security incident procedures in place to handle all kinds of issues emerging from possible security events related to their IT environment. Many of those procedures do not consider the affected assets enough and are restricted to IT components. That’s why I have created a short overview on how to respond to and manage an information security incident with the primary focus on breach incidents involving Personal Information on paper or on IT systems.
Notes
Files
How to Handle Breach Incidents Involving Personal Information.pdf
Files
(175.8 kB)
Name | Size | Download all |
---|---|---|
md5:3ecf05659cae5aa421bc85fb97e95de5
|
175.8 kB | Preview Download |