Security & Data Breach
Policy 1.3.1
Security acceptance test shall be performed on annual basis
SOP
TI Unit check for any irregularities on the MaGIC central database. If a security/data breach is identified, proceed to Step 2. If no security/data breach is identified, proceed to Step 4.
TI Unit inform Tech Lead on the security/data breach for next course of action.
Tech Lead deals with the security breach by performing rectification on the central database. Rectification performed includes but not limited to the following:
Contain breach
Determine the severity of the breach
Take precaution to prevent breach
Notify MaGIC users who are affected.
Tech Lead performs security acceptance test upon rectifying the security/data breach.
Last updated