The Security Incident Procedure provides a method for investigation of security incidents. The objective of this procedure is to provide clarity and consistency to the process of conducting Security investigations of security incidents undertaken by the Investigations Department.
CONTENT
1. OVERVIEW
1.1 PROCEDURE OWNER
1.2 CLASSIFICATION
1.3 APPLICABLE REGULATIONS
1.4 RELATED [COMPANY] NORMS AND PROCEDURES
1.5 OBJECTIVES
1.6 AUDIENCE AND SCOPE
1.7 DOCUMENT SUPPORT
2. DEFINITIONS & ABBREVIATIONS
3. INVESTIGATION PROCEDURE
3.1 INCIDENT IDENTIFICATION
3.2 INCIDENT REPORTING
3.3 INCIDENT INVESTIGATION
3.4 FOLLOW-UP
4. EXCEPTIONS
5. FINAL CONSIDERATIONS
5.1 DISCIPLINARY ACTIONS AGAINST PROCEDURE VIOLATION
5.2 DOCUMENT REVISION
Pages: 8
This bundle contains all the products listed in the Data Governance section. Take advantage of the 25% OFF when buying the bundle!
The Records Control Procedure establishes the rules to be followed in order to maintain control of the identification, storage, protection, retrieval, retention time and disposition of records inside the Company.
The Security Incident Management Standard sets the minimum requirements for security incident management in support of the IT Risk Policy for Information Security, including requirements for analyzing, handling and reporting of security incidents.
Review Security Incident Procedure.
You must be logged in to post a review.