Our Incident Response procedures are designed and tested to ensure potential security events are identified and reported to appropriate personnel for resolution. Our team follows defined protocols for resolving security events, and steps for resolution are documented and reviewed by our Security Team on a regular basis. Additionally, we have updated these policies and procedures to include breach notification if and when a security incident involves the loss of or unauthorized use of personal identifiable information (PII).
Key Components of Our Incident Response Procedures:
Identification and Reporting:
Potential security events are promptly identified and reported to the appropriate personnel for immediate action.
Resolution Protocols:
Our team follows defined protocols for resolving security events to ensure a structured and efficient response.
Documentation and Review:
All steps for resolving security events are documented and reviewed by our Security Team on a regular basis to ensure continuous improvement.
Our commitment to robust incident response ensures that we can effectively handle security events and protect our users' data.