![]() These groups or individuals use considerable resources to obtain access to national and defence information, weapons or other military assets. a political, commercial or issues-motivated group or individual, including the media.These can occur during social events, over the internet or during official meetings held domestically or abroad. Most attempts to collect sensitive information or intelligence are subtle and often appear harmless. take corrective measures and implement controls to prevent or minimize the possibility of future similar incidentsĪ security contact happens when the representative of a group communicates with you to access national security information for which they do not have a need-to-know.complete an investigation of the incident by determining the cause of the incident.Complete the security incident report for company security officers and alternate company security officers.report breaches immediately to the program. ![]() In the event of a security breach, the CSO or ACSO must take the following steps, document them in a security incident report and forward it to the CSP: This means that there has been unauthorized access, disclosure, destruction, removal, modification, use or interruption of protected and classified information and assets. Security breachesĪ security incident that leads to a confirmed compromise of information and assets is considered a security breach.Ī breach is an act, event or omission that results in the compromise of sensitive information or assets. If you suspect a criminal act has been committed, contact your local police service. The investigator assigned to the file will then contact you to make the necessary arrangements to obtain these documents. When submitting either your security incident report or email, clearly indicate in your message whether you must submit sensitive information as part of the incident reporting. Submit either the completed incident report or an email not submit protected and classified information with your report or by email. what are the recommendations to prevent the incident from reoccurring.was any information or asset lost or unaccounted for. ![]()
0 Comments
Leave a Reply. |