Is your feature request related to a problem? Please describe.
If the system is ever breached there is no process for how we handle it.
Describe the solution you'd like
Determine and document a process for how we handle a breach. Here should be how we stop the breach, call the authorities, determine what information has been leaked, inform the people whose information might have been leaked and how we prevent another breach.
Is your feature request related to a problem? Please describe.
If the system is ever breached there is no process for how we handle it.
Describe the solution you'd like
Determine and document a process for how we handle a breach. Here should be how we stop the breach, call the authorities, determine what information has been leaked, inform the people whose information might have been leaked and how we prevent another breach.