How do I contain a data breach?
Containing the data breach is one part of the 4-step OAIC process of what to do when you have a data breach.
1. Stop the person from accessing it if you can. Eg, remove their access, lock their account.
2. Shut down your system.
3. Change the access to the system, eg change the passwords
Remember not to delete anything that can be used as evidence of the breach.
Here is more details on containing a data breach.
Whether you have a request, a query, or want to work with us, use the form below to get in touch with our team.