Last updated in 1 November 2024
SECURITY INCIDENT AND BREACH HANDLING
Purpose
This policy outlines procedures for identifying, reporting, managing, and mitigating security incidents and breaches to protect Quicklend’s data, systems, and stakeholders.
- Scope
This policy applies to:
- All Quicklend employees, contractors, and third-party service providers.
- All Quicklend systems, applications, networks, and data assets.
- Definitions
- Security Incident: Any event that may compromise the confidentiality, integrity, or availability of Quicklend’s information or systems, such as unauthorized access, malware, or phishing.
- Data Breach: An incident where sensitive, protected, or confidential information is accessed, disclosed, or stolen without authorization.
- Roles and Responsibilities
- Incident Response Time (IRT):
The IRT is responsible for managing security incidents and breaches. Members include representatives from:
- IT Department Senior
- Legal and Compliance
- Risk Management
- Leadership
- Key Roles:
- Incident Manager: Coordinates response efforts and serves as the primary point of contact.
- IT Security Analyst: Identifies, investigates, and mitigates technical threats.
- Compliance Officer: Ensures adherence to legal and regulatory requirements
- Incident Response Time (IRT):
- Incident and Breach Handling Procedure
- 4.1. Identification
- Monitor systems for anomalies using security tools (e.g., intrusion detection systems).
- Encourage employees to report suspicious activities immediately to the IT Helpdesk.
- 4.2. Reporting
- Report incidents or breaches within 24 hours of discovery to the Incident Manager.
- Use the “Incident Reporting Form” for detailed information.
- 4.3. Containment
- Immediately isolate affected systems to prevent further damage.
- Change access credentials and disable compromised accounts.
- 4.4. Eradication
- Identify and remove malicious code, unauthorized users, or vulnerabilities.
- Apply patches, updates, or additional safeguards.
- 4.5. Recovery
- Restore affected systems and data from backups.
- Conduct thorough testing to ensure systems are secure before resuming operations.
- 4.6. Notification
- Notify affected individuals, clients, or regulators as required by law (e.g., GDPR or local regulations).
- Communications must be approved by Legal and Senior Leadership.
- 4.7. Post-Incident Review
- Conduct a detailed review within 5 business days of resolution.
- Document lessons learned and update security controls and policies.
- 4.1. Identification
- Notification Timeline
Stakeholder Notification Deadline Responsible Party Senior Management Within 24 hours Incident Manager Affected Customers Within 72 hours Legal & Compliance Regulators As per regulations Compliance Officer - Preventive Measures
- Conduct regular security awareness training
- Perform periodic security audits and penetration tests.
- Maintain a robust patch management program.
- Compliance and Enforcement
Non-compliance with this policy may result in disciplinary action, up to and including termination. Contractors or third parties may face contract termination or legal actions.