Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Incident Reference Information: Basic metadata including report number, date/time of report, and reporter details
2. Incident Overview: High-level summary of the security incident including type, severity, and initial impact assessment
3. Incident Timeline: Detailed chronological record of when the incident was detected, actions taken, and key events
4. Impact Assessment: Analysis of affected systems, data, users, and business operations
5. Immediate Response Actions: Documentation of steps taken to contain and mitigate the incident
6. Systems/Assets Affected: Detailed list of compromised or affected IT assets, systems, or data
7. Incident Category and Classification: Formal categorization of the incident type and severity level
8. Notification Requirements: List of internal and external parties that have been or need to be notified
1. Data Breach Details: Required when personal data is compromised, including types of data affected and number of individuals impacted
2. Financial Impact: Include when there are quantifiable financial losses or costs associated with the incident
3. Third-Party Involvement: Required when external vendors, service providers, or contractors are involved in the incident
4. Regulatory Compliance Impact: Include when the incident affects compliance with specific regulations or standards
5. Business Continuity Measures: Required when incident triggers business continuity or disaster recovery procedures
6. Media/Public Relations Impact: Include when the incident has potential public exposure or media implications
1. Appendix A - Evidence Collection Log: Detailed log of all evidence collected during incident investigation
2. Appendix B - System Logs: Relevant system, network, or application logs related to the incident
3. Appendix C - Communication Records: Records of all internal and external communications regarding the incident
4. Appendix D - Screenshots and Technical Evidence: Visual documentation and technical evidence of the incident
5. Appendix E - Action Item Tracker: List of follow-up actions, responsibilities, and deadlines
6. Appendix F - Incident Response Checklist: Standard checklist of required response actions based on incident type
Find the exact document you need
Security Guard Report Form
An Indonesian-compliant Security Guard Report Form for documenting security activities, incidents, and observations during security shifts.
Incident Notification Form
An Indonesian-law compliant form for recording and reporting workplace incidents, accidents, and near-misses, meeting statutory notification requirements.
Hazard Incident Report Form
A comprehensive incident reporting form designed for documenting workplace hazards and safety incidents in compliance with Indonesian safety regulations.
Employee Incident Report Form
An Indonesian workplace incident reporting form that complies with local labor laws and BPJS requirements, used to document and track workplace accidents and incidents.
Critical Incident Report Form
An Indonesian-compliant form for documenting and reporting workplace critical incidents, aligned with national safety regulations.
Security Incident Report Form
An Indonesian-compliant security incident documentation and reporting form that aligns with national cybersecurity regulations and facilitates systematic incident response management.
Incident Response Form
An Indonesian-compliant incident response documentation form for recording and managing security incidents under local PDP Law and BSSN regulations.
Incident Investigation Form
An Indonesian-compliant workplace incident investigation documentation form that meets local safety regulations and reporting requirements.
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it

.png)
.png)