Document and maintain a detailed registry and history of data breaches and incidents as required from Data Privacy and Cybersecurity regulations.
REPORT TO THE AUTHORITY OR NOT?
Reporting a data breach incident to the Data Protection Authority or even to the potentially affected individuals (data subjects) is a significant task. Assess the need to inform the Data Protection Authority (DPA) or the affected individuals using Enactia’s quick check mechanism.
ON-TIME INCIDENT REPORTING
Keep track and be alerted on time in order to report a data breach as required by Data Protection and Cybersecurity requirements and regulations (i.e. reporting a data breach within 72 hours).
DATA PROTECTION AUTHORITY REPORT PREPARATION
Create data breach notification reports and keep a detailed history of all notifications made for a specific data breach to the Data Protection Authority (DPA) or to the affected individuals (data subjects).
DPA NOTIFICATION TEMPLATES OR BUILD-YOUR-OWN
Cybersecurity and privacy professionals can use existing templates or create their own DPA Notifications templates in the forms of questionnaires and provide the key indicators of the compliance level for the organization. Enactia, being a multi-user platform, allows others from within the organization to log in and answer questions that have been assigned to them. The dashboard gives a complete picture of the status of all DPA notification reports.
CENTRAL REPOSITORY FOR MAINTAINING INCIDENT RELATED DOCUMENTS
Keep Incident relevant documentation and investigation reports in a central repository (such as responses received from the data protection authority, communication approach to affected data subjects, incident investigation reports and much more).
TASK MANAGEMENT FOR CYBER INCIDENTS & DATA BREACHES
Assign tasks to your colleagues in order to monitor and coordinate the incident/data breach investigation (marketing, communications, internal audit, forensic experts, IT department, legal, etc.).
LINKING DATA BREACHES & CYBER INCIDENTS TO RPAs
In case of a data breach, it is important to recognize which processes may have been affected. Enactia allows you to map certain data breaches to specific data processing activities and at the same time, you will be able to recognize which are the affected data assets and the respective Personal Identifiable Information (PII).