|
Post by juthi52943 on Jan 4, 2024 3:32:13 GMT
Regular testing of the effectiveness of activities, including conducting penetration tests. Adjusting the level of system protection to current threats is a key element of ensuring the security of data processing in organizations. Cyberattack register For the controller, countering a cyber attack involves creating internal documentation and presenting it to the supervisory authority responsible for data protection. This documentation must include at least administrator data Job Function Email List and contact details for providing further information, information about other entities involved in the event (if necessary), a short description of the event, description of the chronology of events and actions taken (including traditional and electronic correspondence, notes from telephone conversations, etc. A justification for delaying reporting or notifying the authority of the breach (if necessary), assessment of the seriousness of the infringement, indication of the categories of data subjects and the approximate number of these persons, indication of data categories, a description of the likely consequences of the event, including an assessment of the risk of violating the rights and freedoms of natural persons.
|
|