Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Incident Response Form
"I need an Incident Response Form that complies with German BDSG and GDPR requirements for our healthcare organization, with specific sections for patient data breaches and integration with our existing ISO 27001 compliance framework."
1. Incident Reporter Details: Information about the person reporting the incident, including name, position, contact details, and department
2. Incident Detection Information: Date, time, and method of incident detection, including who discovered it and how it was initially identified
3. Incident Classification: Severity level, type of incident (e.g., data breach, system outage, malware), and initial impact assessment
4. Affected Systems/Data: Details of affected systems, applications, or data, including whether personal data is involved (GDPR relevance)
5. Incident Description: Detailed description of the incident, including known cause, scope, and current status
6. Initial Response Actions: Actions already taken to contain or respond to the incident, including timestamp of each action
7. Notifications Made: List of internal and external stakeholders already notified, including timestamps
8. Business Impact: Assessment of actual and potential impact on business operations, customers, and data subjects
1. GDPR Breach Assessment: Additional section required when personal data is involved, including risk assessment for data subjects and 72-hour notification requirement tracking
2. Critical Infrastructure Impact: Required for organizations falling under IT-Sicherheitsgesetz 2.0, detailing impact on critical infrastructure services
3. Financial Sector Details: Additional section for financial institutions subject to KWG requirements
4. Third-Party Involvement: Section for incidents involving third-party vendors or service providers
5. Insurance Notification Details: Section for capturing information required for cyber insurance claims
1. Incident Response Checklist: Step-by-step checklist for ensuring all required response actions are completed
2. Evidence Collection Log: Detailed log of all evidence collected related to the incident
3. Communication Log: Record of all internal and external communications regarding the incident
4. Technical Details Appendix: Detailed technical information about the incident, including logs, affected IP addresses, and system details
5. Regulatory Notification Requirements: Matrix of notification requirements based on incident type and affected data/systems
Authors
Security Breach
Data Breach
Personal Data
Special Categories of Personal Data
Affected Systems
Critical Infrastructure
Response Actions
Containment Measures
Data Subject
Controller
Processor
Supervisory Authority
BSI
Incident Reporter
Response Team
Impact Level
Root Cause
Business Impact
Technical Controls
Incident Timeline
Evidence
Mitigation Measures
Recovery Actions
Notification Requirements
Risk Level
Affected Assets
Compromise Indicators
System Vulnerability
Security Controls
Incident Classification
Data Protection Officer
Information Security Officer
Business Continuity
Incident Status
Incident Classification
Data Protection
Regulatory Reporting
Evidence Collection
Impact Assessment
Response Actions
Notification Requirements
Documentation Requirements
Confidentiality
Authority and Responsibility
Timeline Requirements
Communication Protocols
Systems Affected
Business Continuity
Root Cause Analysis
Recovery Measures
Compliance Requirements
Escalation Procedures
Third-Party Obligations
Financial Services
Healthcare
Technology
Manufacturing
Energy
Telecommunications
Public Sector
Transportation
Retail
Professional Services
Critical Infrastructure
Education
Information Security
IT Operations
Legal & Compliance
Risk Management
Data Protection
Security Operations Center
Internal Audit
Crisis Management
Corporate Communications
Human Resources
Executive Leadership
Chief Information Security Officer
Data Protection Officer
IT Security Manager
Risk Manager
Compliance Officer
Security Incident Response Lead
Information Security Analyst
IT Operations Manager
Chief Technology Officer
Legal Counsel
Privacy Manager
Security Operations Center Analyst
Chief Information Officer
Audit Manager
Information Security Director
Find the exact document you need
Health And Safety Incident Report Form
German-compliant Health and Safety Incident Report Form for documenting workplace accidents and incidents under Arbeitsschutzgesetz requirements.
Hazard Report Form
A German-compliant workplace hazard reporting form for documenting and addressing safety risks under German workplace safety regulations.
Hazard Incident Report Form
A German-law compliant form for documenting and reporting workplace hazards and incidents, aligned with ArbSchG requirements and DGUV regulations.
Employee Incident Report Form
German-compliant Employee Incident Report Form for documenting workplace accidents and incidents, aligned with ArbSchG requirements and data protection regulations.
Critical Incident Report Form
A German-compliant workplace incident documentation form used to report and track significant events or accidents in accordance with German safety regulations.
Incident Response Form
A German law-compliant form for documenting and reporting security incidents, aligned with GDPR and BSI requirements.
Incident Investigation Form
A German-compliant workplace incident investigation template for systematic incident documentation and analysis under Arbeitsschutzgesetz requirements.
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.