.
This commit is contained in:
@@ -2705,18 +2705,32 @@ b. The Company Committee shall review all TBOC amendments and determine applicab
|
|||||||
|
|
||||||
### Section 10.13 - Technology and Cybersecurity
|
### Section 10.13 - Technology and Cybersecurity
|
||||||
|
|
||||||
1. Cybersecurity Requirements:
|
1. **Cybersecurity Requirements**:
|
||||||
|
|
||||||
- Implement robust cybersecurity measures
|
a. Implement robust cybersecurity measures;
|
||||||
- Regular security audits
|
|
||||||
- Incident response planning
|
b. Regular security audits;
|
||||||
- Data protection protocols
|
|
||||||
|
c. Incident response planning;
|
||||||
|
|
||||||
|
d. Data protection protocols; and
|
||||||
|
|
||||||
|
e. Data breach notification and response protocol that includes:
|
||||||
|
|
||||||
|
i. Immediate containment procedures;
|
||||||
|
|
||||||
|
ii. Forensic investigation requirements;
|
||||||
|
|
||||||
|
iii. Member and stakeholder notification within 72 hours of discovery;
|
||||||
|
|
||||||
|
iv. Regulatory compliance assessments;
|
||||||
|
|
||||||
|
v. Remediation planning and implementation;
|
||||||
|
|
||||||
|
vi. Post-incident analysis and reporting; and
|
||||||
|
|
||||||
|
vii. Security enhancement measures based on findings.
|
||||||
|
|
||||||
2. Technology Governance:
|
|
||||||
|
|
||||||
- Ongoing technology risk assessment
|
|
||||||
- Compliance with industry best practices
|
|
||||||
- Regular technology strategy reviews
|
|
||||||
|
|
||||||
## SIGNATURES
|
## SIGNATURES
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user