The Data Breach Assistant helps to navigate and document data breaches in a fast, transparent and compliant way. By replacing manual or Excel-based processes, the Data Breach Assistant enables you to assess suspected breaches against the respective regulatory framework, triage information and automate necessary documentation – all based on highly customizable risk-scoring models. Additionally, all incidents are documented in an audit trail. If desired, a report and dashboard can also be generated to monitor and visualize key factors, such as, type of breach, number of incidents etc.
Under the EU General Data Protection Regulation (GDPR), companies are obliged to report personal data breaches to the competent supervisory authority within 72 hours and, under certain circumstances, also to the affected person. Companies therefore need to have systems in place in order to effectively handle potential personal data breaches. Such systems specifically need to be able to handle the following tasks:
- detection of incidents within the company’s business units, which could constitute personal data breaches
- assessment of the incident’s relevance and, if applicable, the necessary measures required under data protection laws
- reporting of the incident and its assessment to the responsible department within the company
With BRYTER, you can build a tool which uses predefined criteria to determine whether a personal data breach has occurred, and which steps must be taken in accordance with the GDPR guidelines. Through a customizable, interactive questionnaire, the user is able to input, collect and process all relevant data. The modular logic of the Data Breach Assistant allows this questionnaire to be adapted to the user’s context in order to cover a large number of cases.
How it works
Identify data breach
Through a customizable, user-friendly and interactive questionnaire, all relevant data is collected and processed. It enables users to assess suspected breaches against the respective regulatory tests and to generate automated triaging and documentation.
A risk profile is generated from the initial assessment, flagging certain risks and providing recommendations for mitigation. The risk assessment can be intertwined with other processes (email, approvals, etc.) and document generation to streamline incident responses.
A dashboard allows to track and drive mitigation efforts and to document all incidents. This helps to hold risk owners accountable to deadlines and also offers metrics on overall risk reduction.