Login

Security Notification Breach Notification Policy

A. INTRODUCTION

TOP

An information technology (IT) security incident is an event involving an IT resource at ScaleWP (SWP) that has the potential of having an adverse effect on the confidentiality, integrity, or availability of that resource or connected resources. Resources include individual computers, servers, storage devices and media, and mobile devices, as well as the information, messages, files, and/or data stored on them. Prompt detection and appropriate handling of these security incidents is necessary to protect ScaleWP’s information assets and to preserve the privacy and confidentiality of personal data.

The purpose of this IT Security Information Breach Notification Policy is to provide general guidance to SWP to enable quick and efficient recovery from security incidents; respond in a systematic manner to incidents and carry out the steps necessary to handle an incident; and minimize disruption to critical computing services or loss or theft of sensitive or mission critical information.

The sections below describe: 1) Who to notify upon discovery of an incident; 2) procedures for handling and recovering from an incident in a manner appropriate to the type of security incident; and 3) how to establish a reporting format and evidence retention procedure. This document provides an overview of the process. Any questions about this Policy should be directed to: [email protected].

In the event of a Breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, GDPR Data (“GDPR Breach”), SWP is legally required to assess the risks to data subjects and may be required to notify data protection authorities and affected data subjects.

“GDPR Data” includes any personal information that is transmitted, stored, or otherwise processed by SWP relating to an identified or identifiable natural person that is subject to the European Union (EU) General Data Protection Regulation (“GDPR”). An identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, or an online identifier, or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural, or social identity of that natural person. For further guidance as to which personal information is subject to the GDPR, please consult with SWP’s GDPR Data Protection Officer (the “DPO”).

In order to comply with the requirements of the GDPR, it is critical that all of the steps outlined in this Policy occur within seventy-two (72) hours of the first point at which an incident is discovered. In all cases, regardless of jurisdiction, the process must be completed as expeditiously as is reasonably feasible.

In the United States, state legislatures increasingly have imposed significant privacy-security obligations, especially regarding computerized data. Although the particulars (e.g., type, timing, and target) vary from state to state, all 50 states and the District of Columbia require disclosure of a breach.

Under Missouri’s data breach reporting law, whenever there is a breach of certain types of computerized personal data of a Missouri State resident, the breach must be reported to the affected individuals in the most expedient time possible and without unreasonable delay and also the Missouri Attorney General, Department of State, and Division of State Police must be notified. For more information about the Missouri breach reporting law, see Appendix D. In the event of a potential breach, an analysis should also be performed in consultation with the Office of General Counsel to determine whether the data breach reporting laws of any other states may be implicated.

 

B. OVERVIEW OF WORKFLOW

TOP

When a security incident is detected or reported, key first steps are to (1) contain the incident, (2) initiate an investigation of its scope and origins, and (3) decide if it qualifies as a Breach.

 

C. OVERVIEW OF ROLES

TOP

  1. Incident Handler: This role is filled by IT security staff from SWP IT.
  2. System Administrator: This role is filled by the technical staff responsible for deploying and maintaining the system at risk. Also referred to as a “first responder” in the context of this process.
  3. System Owner: This role is filled by the staff member or management member who has responsibility for the business function performed by the system. The System Owner is not necessarily the person who paid for the system, but rather the person who has control over it.
  4. Network Operations: This role is filled by the technical staff responsible for network infrastructure at the site housing the system at risk. At Washington Square, this is SWP IT Networking Services.
  5. PCI Compliance Manager: This role is filled by the person responsible for overseeing SwP’s PCI compliance program.
  6. DPO: This role is filled by SWP’s GDPR Data Protection Officer, who may be assisted by designated Data Protection Officers at each of SWP’s Global Sites in the EU.

 

D. IDENTIFICATION

TOP

The identification phase of incident response has as its goal the discovery of potential security incidents and the assembly of an incident response team that can effectively contain and mitigate the incident:

  1. Identify a potential incident. The incident handler may do so through monitoring of security sensors. System owners or system administrators may do so by observing suspicious system behavior. Any member of SWP may identify (i.e., detect) a potential security incident though external complaint/notification, or other knowledge of accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, High Risk Data or GDPR Data.
  2. Notify: SWP members that suspect an IT system or paper-based files have been subject to accidental or unlawful destruction, loss, or alteration, or unauthorized disclosure or access, must immediately report the situation to [email protected]. Once the incident handler is aware of a potential incident, s/he will alert local system administrators. If an incident is discovered by a member of the Covered Component or Support Component or by a Business Associate, the person should notify GOIS and the relevant Covered Component’s or Support Component’s HIPAA EPHI Security Officer and HIPAA Privacy Officer immediately, and follow GOIS’ instructions on how to proceed. No one should interact with the system, unless approved by GOIS.
  3. Quarantine: The incident handler will quarantine compromised hosts at the time of notification unless they are on the Quarantine Whitelist. If they are on the Quarantine Whitelist, the incident handler will promptly reach out to the system administrator or system owner to create a plan to contain the incident. Note that the incident handler may notify on suspicious behavior when s/he is not confident of a compromise; in these cases, they do not quarantine the host immediately, but wait 24-48 hours and quarantine only if the registered contact is unresponsive.

 

E. VERIFICATION

TOP

This phase also precedes CIR, and has the primary goal of confirming that the compromise is genuine and presents sufficient risk to engage the CIR process:

  1. Classify: The CIR must be initiated if…
    1. The system owner or system administrator indicates that the system is a High Criticality System. The system owner or system administrator asserts that the system contains High Risk Data
    2. or someone of appropriate authority (for example, an SWP IT Associate Vice President or higher) determines that the system poses a unique risk that warrants investigation.
  2. Verify: The CIR process should be initiated only if…
    1. The incident handler verifies that the triggering alert is not a false positive. The incident handler will double-check the triggering alert, and correlate it against other alerting systems when possible.
    2. and the type of data or system at risk is verified to be of an appropriate classification, as determined above. The system owner or system administrator should provide a detailed description of the data at risk, including approximate numbers of unique data elements at risk, and the number, location, and type of files it is stored in.

The order of the steps above can vary from incident to incident, but for the CIR process to be initiated the criticality of the asset must be confirmed, and it must be confirmed that the triggering event is not a false positive. In cases where the CIR process is not required, the incident handler can resolve the case as follows:

  1. Obtain a written (email is acceptable and preferred) statement from the system owner or system administrator documenting that the system has no High Risk Data or GDPR Data and is not a high-criticality asset.
  2. Obtain a written statement from the system owner or system administrator that the system has been reinstalled or otherwise effectively remediated before quarantine is lifted.
  3. Obtain a written statement that the access point has been disabled for incidents involving an unauthorized wireless access point.

 

F. CONTAINMENT

TOP

The containment phase represents the beginning of the CIR workflow and has the following goals:

  1. If the host cannot immediately be removed from the network, the incident handler will initiate a full-content network dump to monitor the attacker’s activities and to determine whether interesting data is leaking during the investigation.
  2. Eliminate attacker access: Whenever possible, this is done via the incident handler performing network quarantine at the time of detection and by the system administrator unplugging the network cable. In rare cases, the incident handler may request that network operations staff implement a port-block to eliminate attacker access. In cases where the impact of system downtime is very high, the incident handler will work with system administrators to determine the level of attacker privilege and eliminate their access safely.
  3. The incident handler will collect data from system administrators in order to quickly assess the scope of the incident, including:
    1. Preliminary list of compromised systems
    2. Preliminary list of storage media that may contain evidence
    3. Preliminary attack timeline based on initially available evidence
  4. Preserve forensic evidence:
    1. System administrators will capture first responder data if the system is turned on. The incident handler will provide instructions for capturing this data to the individual performing that task.
    2. The incident handler will capture disk images for all media that are suspected of containing evidence, including external hard drives and flash drives. System administrators will deliver the system to GOIS after the first responder data is captured; disk imaging and analysis will occur at GOIS. The system owner should expect to have it returned within five (5) business days.
    3. The incident handler will dump network flow data and other sensor data for the system.
    4. The incident handler will create an analysis plan to guide the next phase of the investigation.

This is the most time-sensitive and also the most contextually-dependent phase of the investigation. The actions that need to be taken will depend on the uptime requirements of the compromised system, the suspected level of attacker privilege, the nature and quantity of data at risk, and the suspected profile of the attacker. The most important goals of this phase are to eliminate attacker access to the system(s) as quickly as possible and to preserve evidence for later analysis.

Additionally, this is the phase where the incident handler works most closely with system administrators and system owners. During this phase they are expected to take instruction from the incident handler and perform on-site activities such as attacker containment, gathering first response data, and delivering the system to GOIS in cases where host-based analysis is required.

 

G. ANALYSIS

TOP

The analysis phase is where in-depth investigation of the available network-based and host-based evidence occurs. The primary goal of analysis is to establish whether there is reasonable belief that the attacker(s) successfully accessed High Risk Data or GDPR Data on the compromised system. Secondary goals are to generate an attack timeline and ascertain the attackers’ actions. All analysis steps are primarily driven by the incident handler, who coordinates communications between other stakeholders, including system owners, system administrators, and relevant compliance officers. Questions that are relevant to making a determination about whether data was accessed without authorization include:

  1. Suspicious Network Traffic: Is there any suspicious or unaccounted for network traffic that may indicate data exfiltration occurred?
  2. Attacker Access to Data: Did attackers have privileges to access the data or was the data encrypted in a way that would have prevented reading?
  3. Evidence that Data Was Accessed: Are file access audit logs available or are file system mactimes intact that show whether the files have been accessed post-compromise?
  4. Length of Compromise: How long was the host compromised and online?
  5. Method of Attack: Was a human involved in executing the attack or was an automated “drive-by” attack suite employed? Did the tools found have capabilities useful in finding or exfiltrating data?
  6. Attacker Profile: Is there any indication that the attackers were data-thieves or motivated by different goals?

The analysis will include an evaluation of the likelihood of risk to data subjects, including, for example, risks related to identity theft or fraud, financial loss, damage to reputation, and discrimination. The analysis should include whether the data has been encrypted, coded, or protected through other technological controls from use by an unauthorized person. The process and facts considered in reaching a determination as to the likely risks to data subjects must be documented.

In the case of a potential breach of Private Information, GOIS will conduct a risk assessment to determine the probability that a “breach of the security of the system” has occurred, which is defined under Missouri law to mean an unauthorized access to or acquisition of, or access to or acquisition without valid authorization of, computerized data that compromises the security, confidentiality, or integrity of Private Information maintained by SWP. Good faith access to, or acquisition of, Private Information by an employee or agent of SWP for the purposes of SWP is not a breach of the security of the system, provided that the Private Information is not used or subject to unauthorized disclosure.

In determining whether information has been accessed, or is reasonably believed to have been accessed, by an unauthorized person or a person without valid authorization, GOIS may consider, among other factors, indications that the information was viewed, communicated with, used, or altered by a person without valid authorization or by an unauthorized person.

In determining whether information has been acquired, or is reasonably believed to have been acquired, by an unauthorized person or a person without valid authorization, GOIS may consider the following factors, among others:

  1. indications that the information is in the physical possession and control of an unauthorized person, such as a lost or stolen computer or other device containing information; or
  2. indications that the information has been downloaded or copied; or
  3. indications that the information was used by an unauthorized person, such as fraudulent accounts opened or instances of identity theft reported.

At the conclusion of the analysis, but before the final report is written, a peer review should be requested of the other GOIS technical staff. Then, the write-up of the notes should be completed, including conclusions, and processed source materials (e.g., grep-results, file-timelines, and filtered flow-records) should be archived. The peer review may result in some issues that must be addressed and some issues that may optionally be addressed. All recommendations should be resolved or acknowledged and deferred. The incident handler’s role is to determine, from a technical perspective, whether there is a reasonable belief that High Risk Data or GDPR Data, including PHI/EPHI, was available to unauthorized persons. The determination of whether the circumstances warrant a Breach notification will be made jointly by the SWP Officials convened upon review of the results of the investigation, the technical opinion of GOIS, and the advice of the Office of General Counsel.

 

H. RECOVERY

TOP

The primary goal of the recovery phase is to restore the compromised host to its normal business function in a safe manner.

  1. The system administrators will remediate the immediate compromise and restore the host to normal function. This is most often performed by reinstalling the compromised host; although if the investigation confirms that the attacker did not have root/administrator access other remediation plans may be effective.
  2. The system administrators will make short-term system, application, and business process changes to prevent further compromise and reduce operating risk.

 

I. INTERNAL REPORTING

TOP

The final report serves two (2) main purposes. First, a recommendation is made to the Office of General Counsel and relevant compliance officers as to whether the incident handler and the responsible officials feel there is a reasonable belief that High Risk Data or GDPR Data was subject to accidental or unlawful destruction, loss, or alteration, or unauthorized disclosure or access, and the degree of probability of risks to data subjects or that the security or privacy of any data has been compromised. The report must be made in sufficient time to allow notification, if appropriate, within any legally-mandated time period. As noted, under the EU GDPR, notification to authorities must occur, wherever feasible, within seventy-two (72) hours of discovery of a GDPR Breach. Under the MO data breach reporting law, notification must be made in the most expedient time possible and without unreasonable delay. Second, a series of mid-term and long-term recommendations are made to the owners of the compromised system/files, including responsible management, suggesting improvements in technology or business process that could reduce operating risk in the future.

  1. The incident handler will draft the final report after the investigation is complete. Preliminary reports should be avoided whenever possible since working conclusions can change substantially through the course of an investigation.
  2. After the draft report is completed, signoff on the content of the report should be obtained from GOIS management. Technical personnel can offer comments now as well, but typically technical issues should be resolved by this stage. Again, a list of issues will be raised which should be resolved or acknowledged/deferred until GOIS management accepts the report.
  3. For critical incidents involving payment card data, the PCI Compliance Manager will receive a copy of the report and appropriate entities will be notified in the event that cardholder data is accessed without authorization. The PCI Compliance Manager will be responsible for all communication with the payment card brands and will be responsible for coordinating the activities mandated by the payment card brands with respect to the incident.
  4. For incidents involving GDPR Data, the report will address each accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, GDPR Data. The notification procedure outlined in Appendix A will be followed.
  5. If appropriate, given the analysis, the incident handler will obtain sign-off from the Office of General Counsel on the report.
  6. The incident handler will schedule a meeting to deliver the final report to the system administrator, the system owner, as well as to responsible officials. Although the correct management contact will vary on a case-by-case basis, it should typically be Director-level or above. Do not distribute electronic copies of the report via email.
  7. The incident handler will ensure that the final report includes the details of the investigation and mid-term and long-term recommendations to improve the security posture of the organization and limit the risk of a similar incident occurring in the future.

 

J. DATA RETENTION

TOP

  1. The incident handler will archive the final report in case it is needed for reference in the future; reports must be retained for six (6) years.
  2.  Incident notes should be retained for six (6) months from the date that the report is issued. This includes the confluence investigation page, processed investigation materials like grepped file-timelines and filtered network-flows, etc.
  3. Raw incident data should be retained for thirty (30) days from the date that the report is issued. This includes disk-images, unfiltered netflow-content, raw file-timelines, and other data that was collected but deemed not relevant to the investigation.
  4. Request Tracker (RT) tickets from the GOIS ticketing system related to the investigation should be retained for three (3) years.

 

APPENDIX A: BREACH OF GDPR DATA

TOP

  1. Within twenty-four (24) hours of the discovery of a GDPR Breach, the DPO, after consultation with the Office of General Counsel, will make a determination as to whether reporting to supervisory authorities and/or data subjects is required by law or is otherwise prudent. A determination from the DPO that notification is required and the authorization from an authorized member of management will initiate the external notification procedure. Notification to EU data protection authorities is required unless a determination is made that the Breach is unlikely to result in a risk to data subjects. If the Breach is likely to result in a High Risk to data subjects, notification to data subjects is also required.
  2. The DPO, after consultation with the Office of General Counsel, will determine the appropriate authorities to notify. Notification to authorities must: (i) describe the nature of the Breach including, where possible, the categories and approximate number of data subjects concerned and the categories and approximate number of Personal Information records concerned; (ii) communicate the name and contact details of the DPO or other contact point where more information can be obtained; (iii) describe the likely consequences of the Breach; and (iv) describe the measures taken or proposed to be taken by SWP to address the Breach, including, where appropriate, measures to mitigate its possible adverse effects.
  3. External reporting to the EU GDPR supervisory authorities must be conducted within seventy-two (72) hours of discovery of the security incident, wherever feasible. If any delay in reporting is necessary, the reasons for this delay must be documented. In all cases, external reporting must be conducted within thirty (30) days.
  4. The business process owner of the compromised system/files will compile the list of the specific individuals whose GDPR Data is reasonably believed to have been accessed and/or acquired by an unauthorized person. When identification of specific individuals cannot be made, all individuals who are likely to have been affected, such as all whose GDPR Data is stored in the files involved, should be notified. The process for determining inclusion in the notification group must be documented.
  5. The DPO, after consulting with the Office of General Counsel, will determine the plan for notifying individuals affected by the Breach consistent with the following guidelines:
  • The method of notification –
    • In general, notices should be sent by postal mail or, preferably, email. SWP’s standard Breach notice will consist of an email message featuring the official SWP logo, addressed to the individual at the last recorded email address registered with SWP. Any notices returned as undeliverable should be re-sent via another channel, such as by first class mail, if alternate contact information is available.
    • In the case of a severe, widespread Breach of security, as determined by the DPO, after consulting with the Office of General Counsel, (a) a “Notice of Breach” must be conspicuously posted on SWP’s website; and (b) major media outlets, including television, radio, and print must be notified.
  • The content of the notice –
    • The notice should include a description of the incident in general terms;
    • The notice should include a description of the type of GDPR Data that was the subject of the Breach;
    • The notice should include a description of the general acts of SWP to protect the information from further unauthorized access and/or acquisition;
    • The notice should include a telephone number that the individual may call for further information and assistance; and
    • The notice should include advice that directs the individual to remain vigilant by reviewing account statements and monitoring free credit reports, where applicable to the nature of the Breach.
  • The timing of notification –
    • Affected individuals must be notified in the most expedient time possible, and without unreasonable delay, consistent with any measures necessary to determine the scope of the Breach and to restore the reasonable integrity of the data system.
    • Delay is permitted when a law enforcement agency has determined that notification will impede a criminal investigation. In such a case, notification must occur as soon as the law enforcement agency determines that notification will no longer compromise the investigation. The factors considered when determining the timing of notification must be documented.

 

APPENDIX B: MISSOURI BREACH NOTIFICATION LAW

TOP

Mo. Rev. Stat. § 407.1500

H.B. 62

Effective August 28, 2009


Application. Any individual, corporation, business trust, estate, trust, partnership, limited liability company, association, joint venture, government, governmental subdivision, governmental agency, governmental instrumentality, public corporation, or any other legal or commercial entity (collectively, Entity) that owns or licenses PI of residents of MO or any person that conducts business in MO that owns or licenses PI of a resident of MO.

Security Breach Definition. Unauthorized access to and unauthorized acquisition of PI maintained in computerized form by an Entity that compromises the security, confidentiality, or integrity of the PI.

  • Good-faith acquisition of PI by an Entity or that Entity’s employee or agent for a legitimate purpose of that Entity is not a breach of security, provided that the PI is not used in violation of applicable law or in a manner that harms or poses an actual threat to the security, confidentiality, or integrity of the PI.

Notification Obligation. Any Entity to which the statute applies shall provide notice to the affected consumer that there has been a breach of security following discovery or notification of the breach.

  • Notification is not required if, after an appropriate investigation by the Entity or after consultation with the relevant federal, state, or local agencies responsible for law enforcement, the Entity determines that a risk of identity theft or other fraud to any consumer is not reasonably likely to occur as a result of the breach. Such a determination shall be documented in writing and the documentation shall be maintained for five years.

Notification of Consumer Reporting Agencies. In the event an Entity notifies more than 1,000 consumers at one time pursuant to this section, the Entity shall notify, without unreasonable delay, all consumer reporting agencies that compile and maintain files on consumers on a nationwide basis of the timing, distribution, and content of the notice.

Attorney General Notification. In the event an Entity provides notice to more than 1,000 consumers at one time pursuant to this section, the Entity shall notify, without unreasonable delay, the state AG’s office of the timing, distribution, and content of the notice.

Third-Party Data Notification. Any Entity that maintains or possesses records or data containing PI of residents of MO that the Entity does not own or license, or any Entity that conducts business in MO that maintains or possesses records or data containing PI of a resident of MO that the person does not own or license, shall notify the owner or licensee of the information of any breach of security immediately following discovery of the breach, consistent with the legitimate needs of law enforcement as provided in this section.

Timing of Notification. The disclosure notification shall be made without unreasonable delay and consistent with any measures necessary to determine sufficient contact information and to determine the scope of the breach and restore the reasonable integrity, security, and confidentiality of the data system.

Personal Information Definition. An individual’s first name or first initial and last name in combination with any one or more of the following data elements that relate to the individual if any of the data elements are not encrypted, redacted, or otherwise altered by any method or technology in such a manner that the name or data elements are unreadable or unusable:

  • Social Security Number;
  • Driver license number or other unique identification number created or collected by a government body;
  • Account number or credit card number or debit card number in combination with any required security code, access code, or password that would permit access to an individual’s financial account;
  • Unique electronic identifier or routing code, in combination with any required security code, access code, or password that would permit access to an individual’s financial account;
  • Medical information (information regarding an individual’s medical history, mental or physical condition, or medical treatment or diagnosis by a health care professional); or
  • Health insurance information (an individual’s health insurance policy number, subscriber identification number, or any unique identifier used by a health insurer to identify the individual).

PI does not include information that is lawfully obtained from publicly available sources, or from federal, state, or local government records lawfully made available to the general public.

Notice Required. Notice may be provided by one of the following methods:

  • Written notice;
  • Telephonic notice, if such contact is made directly with the affected consumers; or
  • Electronic notice for those consumers for whom the person has a valid e-mail address and who have agreed to receive communications electronically, if the notice provided is consistent with the provisions regarding electronic records and signatures set forth in 15 U.S.C. § 7001 (E-SIGN Act).

The notice shall at minimum include a description of the following:

  • The incident in general terms;
  • The type of PI that was obtained as a result of the breach of security;
  • A telephone number that the affected consumer may call for further information and assistance, if one exists;
  • Contact information for consumer reporting agencies; and
  • Advice that directs the affected consumer to remain vigilant by reviewing account statements and monitoring free credit reports.

Substitute Notice Available. If the Entity demonstrates that the cost of providing notice would exceed $100,000, or that the class of affected consumers to be notified exceeds 150,000, or that the Entity does not have sufficient contact information or consent, for only those affected consumers without sufficient contact information or consent, or that the Entity is unable to identify particular affected consumers, for only those unidentifiable consumers. Substitute notice shall consist of all the following:

  • E-mail notice when the Entity has an electronic mail address for the affected consumer;
  • Conspicuous posting of the notice or a link to the notice on the Entity’s Web site if the Entity maintains one; and
  • Notification to major statewide media.

Exception: Own Notification Policy. An Entity that maintains its own notice procedures as part of an information security policy for the treatment of PI, and whose procedures are otherwise consistent with the timing requirements of this section, is deemed to be in compliance with the notice requirements of this section if the Entity notifies affected consumers in accordance with its policies in the event of a breach of security of the system.

Exception: Compliance with Other Laws.

  • An Entity that is regulated by state or federal law and that maintains procedures for a breach of the security of the system pursuant to the laws, rules, regulations, guidance, or guidelines established by its primary or functional state or federal regulator is deemed to be in compliance with this section if the Entity notifies affected consumers in accordance with the maintained procedures when a breach occurs.
  • A financial institution that is: (i) subject to and in compliance with the Federal Interagency Guidance Response Programs for Unauthorized Access to Customer Information and Customer Notice, issued on March 7, 2005, by the board of governors of the Federal Reserve System, the Federal Deposit Insurance Corporation, the Office of the Comptroller of the Currency, and the Office of Thrift Supervision, and any revisions, additions, or substitutions relating to said interagency guidance; or (ii) subject to and in compliance with the National Credit Union Administration regulations in 12 CFR Part 748; or (iii) subject to and in compliance with the provisions of Title V of the Gramm-Leach-Bliley Act shall be deemed to be in compliance with this section.

Penalties/Enforcement. The state AG shall have exclusive authority to bring an action to obtain actual damages for a willful and knowing violation of this section and may seek a civil penalty not to exceed $150,000 per breach of the security of the system or series of breaches of a similar nature that are discovered in a single investigation.

Other Key Provisions:

  • Delay for Law Enforcement. The notice required by this section may be delayed if a law enforcement agency informs the Entity that notification may impede a criminal investigation or jeopardize national or homeland security, provided that such request by law enforcement is made in writing or the Entity documents such request contemporaneously in writing, including the name of the law enforcement officer making the request and the officer’s law enforcement agency engaged in the investigation. The notice required by this section shall be provided without unreasonable delay after the law enforcement agency communicates to the Entity its determination that notice will no longer impede the investigation or jeopardize national or homeland security.

 

 

 

REVISION HISTORY

TOP

Version Date Description
1.0 10/1/2019 Original document:
IT Security Information Breach Notification Procedure
1.1 1/10/2020 Edited contacts document:
IT Security Information Breach Notification Procedure

Notes

TOP