This document will assist you in identifying what a data breach is and the procedure is to be followed if you cause, receive or notice a data breach or suspected data breach of restricted or highly restricted information. Use the Information Classification Table as a reference.
This document is related to:
Data Protection Policy
Data Protection Glossary
Information Security Policy
Bring Your Own Device (BYOD)
Policy General Conditions of Use of Computing and Network Facilities
Email Procedures regarding Data Protection