Page 28 - Information_Security_Program
P. 28

SECURITY INCIDENT RESPONSE [DP281]
        Back to Table of Contents

        Scope: Enterprise
        Distribution: All employees
        Purpose: To mitigate the damage of any unauthorized access, use, or disclosure of information.
        External Regulation or Standard: 45 CFR 164.308(a)(6)(ii) ‐ Security Incident Procedures, PCI 12.9
        Reference: Information Security Incident Response Plan Procedures [DP281.A], HIPAA Breach Notification Response Plan [DP281.B],
        Non‐Medical Breach Notification Response Plan [281.C]

         Who is Responsible    Statement     Policy, Standard, or Procedure Statement
                                Number
         Director of Information   DP281.1   Oversee the organization's response and resolution of suspected incidents
         Technology, Privacy                 involving unauthorized use or disclosure of privacy‐restricted information.
         and Data Security with
         Data Security Steering
         Committee
         Director of Information   DP281.2   Maintain a documented response plan for potential breaches of privacy‐
         Technology, Privacy                 restricted information.
         and Data Security
         Director of             DP281.3     The information‐incident response plan will define roles and responsibilities
         Communications with                 and detailed procedures from detection through remediation for responding
         Director of Information             to all privacy‐restricted incidents that pose a material risk to the organization.
         Technology, Privacy                 If it is determined that a breach of Protected Health Information (PHI) has
         and Data Security,                  occurred after DP281.A – Information Security Incident Response Plan has
         Executive Team and                  been followed, refer to DP281.B ‐ HIPAA‐HITECH Breach Notification Response
         other assigned staff                Plan. If, after completing the same process, it is determined that a breach of
                                             information in electronic form has occurred but does not include PHI, refer to
                                             DP281.C – Non‐Medical Breach Notification Response Plan.
         Director of Information   DP281.4   Maintain a log of all suspected incidents involving privacy‐restricted
         Technology, Privacy                 information, including the status of their resolution.
         and Data Security
         Employees               DP281.5     Any employee or contractor must report suspected compromises of privacy‐
                                             restricted information or information systems. See DP281.1 – Information
                                             Security Incident Response Plan for procedures used to report suspected
                                             information security incidents.
         IT Staff and GESM       DP281.6     System administrators must report unusual activity with admin IDs or "super
         System Administrators               IDs" to the Director of Information Technology, Privacy and Data Security.
         Director of Information   DP281.7   Maintain methods to detect and investigate in a timely manner information
         Technology, Privacy                 incident that pose a material risk to the organization.
         and Data Security with
         Director of Information   DP281.8   Test the readiness of its incident‐response plan at least annually.
         Technology, Privacy
         and Data Security
         Director of Information   DP281.9   The organization will inform all employees of their roles in identifying and
         Technology, Privacy                 reporting suspected data security incidents, and train response‐team members
         and Data Security with              on their roles annually.
         Directors and
         Managers







                                                                                                         27 | P a g e
        GES CONFIDENTIAL
   23   24   25   26   27   28   29   30   31   32