Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Security Breach Notification Policy
"I need a Security Breach Notification Policy for our Austrian-based financial services company that includes specific requirements for banking sector compliance, cross-border data transfers, and integration with our existing cyber insurance policy, to be implemented by March 2025."
1. Purpose and Scope: Defines the objective of the policy and its applicability within the organization
2. Definitions: Clear definitions of key terms including 'personal data breach', 'data controller', 'data processor', and security incident classifications
3. Legal Framework: Overview of relevant legislation including GDPR, DSG, and other applicable Austrian laws
4. Roles and Responsibilities: Defines key stakeholders and their responsibilities in breach detection, response, and notification
5. Breach Detection and Initial Assessment: Procedures for identifying and initially assessing potential security breaches
6. Risk Assessment Procedures: Methodology for evaluating the severity and potential impact of a breach
7. Notification Requirements: Detailed procedures for notifying authorities (within 72 hours), affected individuals, and other stakeholders
8. Documentation Requirements: Procedures for recording breaches, actions taken, and maintaining the breach register
9. Response and Mitigation: Steps to contain breaches and prevent further data loss
10. Review and Improvement: Processes for post-incident analysis and policy updates
1. Industry-Specific Requirements: Additional requirements for specific sectors (e.g., financial services, healthcare) - include if organization operates in regulated industries
2. Cross-Border Considerations: Additional procedures for breaches affecting individuals in multiple jurisdictions - include if operating internationally
3. Media Communication Protocol: Procedures for handling media inquiries and public communications - include for larger organizations or those with high public visibility
4. Insurance Notification: Procedures for notifying and working with cyber insurance providers - include if organization has cyber insurance
5. Third-Party Processor Management: Specific procedures for managing breaches involving data processors - include if organization uses external data processors
1. Breach Response Flowchart: Visual representation of the breach response process
2. Contact List: Key contacts including response team members, authorities, and external service providers
3. Breach Assessment Form: Template for documenting initial breach assessment and risk evaluation
4. Authority Notification Templates: Pre-approved templates for notifying the Austrian Data Protection Authority
5. Data Subject Notification Templates: Pre-approved templates for notifying affected individuals
6. Breach Register Template: Template for maintaining records of all breaches as required by GDPR Article 33(5)
7. Security Incident Classification Matrix: Guidelines for categorizing different types of security incidents and their severity levels
Authors
Special Categories of Personal Data
Data Subject
Data Controller
Data Processor
Personal Data Breach
Security Incident
Data Protection Authority
Supervisory Authority
Data Protection Officer
Response Team
Breach Register
Security Breach
Confidentiality Breach
Integrity Breach
Availability Breach
High Risk to Rights and Freedoms
Cross-Border Processing
Notification
Data Protection Impact Assessment
Risk Assessment
Technical Measures
Organizational Measures
Processing
Pseudonymization
Encryption
Data Minimization
Record of Processing Activities
Third Party
Recipient
Affected Individual
Business Continuity Plan
Incident Response Plan
Root Cause Analysis
Material Breach
Non-Material Breach
Data Protection Laws
Appropriate Technical and Organizational Measures
Data Protection by Design and Default
Scope
Definitions
Legal Framework
Roles and Responsibilities
Breach Classification
Risk Assessment
Notification Requirements
Documentation
Response Procedures
Communication Protocols
Data Subject Rights
Regulatory Compliance
Training Requirements
Confidentiality
Record Keeping
Enforcement
Review and Audit
Amendment Procedures
Incident Response
Timeline Requirements
Reporting Obligations
Evidence Preservation
Third Party Management
Insurance and Liability
Business Continuity
Cross-Border Considerations
Authority Cooperation
Financial Services
Healthcare
Technology
Retail
Education
Professional Services
Telecommunications
Manufacturing
Public Sector
Energy
Insurance
E-commerce
Transportation and Logistics
Media and Entertainment
Information Security
Legal
Compliance
IT Operations
Risk Management
Data Protection
Corporate Communications
Human Resources
Executive Leadership
Security Operations Center
Privacy
Internal Audit
Customer Service
Chief Information Security Officer
Data Protection Officer
Chief Privacy Officer
IT Security Manager
Compliance Officer
Risk Manager
Legal Counsel
Information Security Analyst
Privacy Manager
IT Director
Chief Technology Officer
Chief Information Officer
Security Operations Manager
Incident Response Manager
Data Protection Specialist
Corporate Communications Director
HR Director
Find the exact document you need
Infosec Audit Policy
An Austrian-compliant Information Security Audit Policy establishing frameworks for security audits under EU and Austrian law.
Manage Auditing And Security Log Policy
An Austrian-compliant policy document establishing requirements and procedures for managing audit trails and security logs, ensuring alignment with local data protection laws and EU GDPR.
Audit Logging Policy
An Austrian-compliant policy establishing requirements and procedures for system audit logging, aligned with GDPR and local data protection laws.
Security Breach Notification Policy
An Austrian law-compliant policy document outlining mandatory procedures for data breach notification, response, and reporting under GDPR and local regulations.
Information Security Audit Policy
An Austrian law-compliant policy establishing procedures and requirements for information security audits, aligned with GDPR and DSG requirements.
Client Security Policy
An Austrian law-compliant security policy document establishing comprehensive information security controls and compliance requirements under Austrian and EU regulations.
Consent Security Policy
An Austrian law-compliant security policy for consent management, addressing GDPR and local data protection requirements.
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.