Professional Documents
Culture Documents
Data Protection & Information Governance
Data Protection & Information Governance
B. CYBER
I keep updated Anti-Virus software to stay protected against any viruses. Moreover, I
don’t store any sensitive information in my password protected laptop so that there is
no question of it being at risk.
Step 2: Assess the data breach by gathering the facts and evaluating the risks,
including potential harm to affected individuals and, where possible, taking action to
remediate any risk of harm.
Step 3: If the breach is an ‘eligible data breach’ under the NDB scheme ,
notify individuals and the Commissioner.
Step 4: Review the incident and consider what actions can be taken to prevent future
breaches.
E. CYBER ESSENTIALS
I have passed cyber essential certificate which will help me to secure data in a better
way in future
HAWKS TAXIS