Data Breach Reporting Procedure

Back to “Data Protection”

Last Updated: June 13th 2019

This document will assist you in identifying what a data breach is and the procedure is to be followed if you cause, receive or notice a data breach or suspected data breach of restricted or highly restricted information. Use the Information Classification Table as a reference.

 

This document is related to:

Data Protection Policy
Data Protection Glossary
Information Security Policy
Bring Your Own Device (BYOD)
Policy General Conditions of Use of Computing and Network Facilities
Email Procedures regarding Data Protection

Article Attachments

Was this article helpful?

We use cookies to track visits to our website and to deliver targeted messages about the University to users. We do not store personal details. For more information or to change your cookie settings, see our Cookie Policy more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close