Privacy Breach Submission
spending less time on paperwork and more time on breach responses
Key Features
-
Compliant with OAIC Guidelines
Enable business users to quickly and simply provide the details of a potential breach in line with the OAIC’s reporting guidelines.
-
Assess Breaches
Dynamically assess whether a breach has occurred using weighted risk scoring against the OAIC’s breach determination criteria.
-
Triage & Escalate for Review
If a breach has occurred, triage severity and escalate to Privacy team for review.
-
Provides Recommendations & Actions
Provide privacy team with a clear overview of breach and system triage, with structured next steps and recommendations to enable privacy team to quickly and easily action and report on the breach if required.
Benefits
-
Clear and centralized location
Business users can quickly report a breach, reducing panic and confusion around procedures when a breach does occur.
-
Reduce subjectivity from human error
Allow for the objective assessment of breach using risk scoring and OAIC criteria.
-
Minimizes back-and-forth
Minimizes back-and-forth typically faced by privacy teams in dealing with applications that provide insufficient information.
-
Maps directly to OAIC criteria
Make it easy to report a notifiable breach if required.
How Does Checkbox Automate This?
1. Dynamic forms and questionnaires
Enable clear and simple capture of all the key details required to assess a privacy breach.
2. Dynamic outcome assess
Smart-form input is used to generate an objective initial assessment of privacy breach for further triage.
3. Escalation workflow
Based on assessment outcome, privacy breaches can be dynamically escalated using Checkbox’s workflow capabilities to ensure efficient actioning and pro-active risk mitigation.
4. Dashboard overview
Centralised record of all breaches for audit purposes and ability to analyse data to identify trends in breach reports. This insight can be viewed by process administrators to fuel iterative process improvement.