How to: add a new incident

How To
  1. Go Privacy Management > Incident and Breach Management.
  2. Click on ‘+ add incident’.

1. Basic incident details

  1. Provide the Incident name by filling out the ‘Incident name’ field.
  2. Fill out the ‘Incident reported by’ field.
  3. If necessary change the ‘Incident submitted by’ field.
  4. Select the Incident category from the ‘Incident category’ list.
  5. Select the Incident detection date, by selecting a date in the box.
  6. Select the Incident reported date, by selecting a date in the box.
  7. Provide more information in the ‘Incident description’ field.
  8. Upload Relevant documentation  by clicking on browse file or dropping the file into the field.

2. Incident data/Processing context

  1. Select the incident origin, from the ‘Incident origin’ list.
  2. In case you selected internal; select the Involved department(s) and office(s) from the ‘Involved department(s)’ list and the ‘Involved office(s)’ list.
  3. In case you selected external; select the Involved stakeholder(s) from the ‘Involved stakeholder(s)’ list.
  4. Select your role within the incident as ‘controller’ or ‘processor’.
  5. Indicate whether or not personal data is leaked. In case you selected ‘no’ please continu to the summary page (point 6). If you selected ‘yes’ continue reading.
  6. Select involved Data Subjects by filtering on a process and/or processing activity.
  7. The default amount and location of the data subjects involved will automatically filled out. Edit if necessary.
  8. Select involved IM Systems by filtering on a process and/or processing activity.
  9. Select the involved data attributes by filtering on a process and/or processing activity.
  10. Fill out the questions about the involved data in the breach by selecting an answer from the list.
  11. Click on the ‘+’ sign to provide a justification.
  12. Fill out the questions about additional increasing/decreasing impact context factors.

3. Ease of identification

  1. Select the relevant answer on how easy the data subject could be identified based on the leaked data, by selecting the applicable box.
  2. Provide a justification in the free text field.

4. Circumstances of the breach

  1. Check if other potential impact increasing factors are relevant by selecting the items that apply to your breach.
  2. Provide a justification in the free text field.

5. Projected impact

  1. RESPONSUM will provide you a calculated impact. The result calculated is based on a generally defined weight linked to the questions you answered earlier in the root cause analysis.
  2. Make a final decision, by selecting ‘yes’ or ‘no’ from the list.
  3. Provide additional increasing or decreasing parameters by clicking on the ‘+’ sign. Provide a name and a description. Click ‘OK’.
  4. If the calculated score is rejected, provide the updated impact score.

6. Summary

  1. If necessary, provide some extra information.
  2. Click ‘Save’ or ‘Save & exit’
Updated on October 18, 2022

Was this article helpful?

Related Articles