.
This commit is contained in:
@@ -2705,18 +2705,32 @@ b. The Company Committee shall review all TBOC amendments and determine applicab
|
||||
|
||||
### Section 10.13 - Technology and Cybersecurity
|
||||
|
||||
1. Cybersecurity Requirements:
|
||||
1. **Cybersecurity Requirements**:
|
||||
|
||||
- Implement robust cybersecurity measures
|
||||
- Regular security audits
|
||||
- Incident response planning
|
||||
- Data protection protocols
|
||||
a. Implement robust cybersecurity measures;
|
||||
|
||||
2. Technology Governance:
|
||||
b. Regular security audits;
|
||||
|
||||
c. Incident response planning;
|
||||
|
||||
d. Data protection protocols; and
|
||||
|
||||
e. Data breach notification and response protocol that includes:
|
||||
|
||||
i. Immediate containment procedures;
|
||||
|
||||
ii. Forensic investigation requirements;
|
||||
|
||||
iii. Member and stakeholder notification within 72 hours of discovery;
|
||||
|
||||
iv. Regulatory compliance assessments;
|
||||
|
||||
v. Remediation planning and implementation;
|
||||
|
||||
vi. Post-incident analysis and reporting; and
|
||||
|
||||
vii. Security enhancement measures based on findings.
|
||||
|
||||
- Ongoing technology risk assessment
|
||||
- Compliance with industry best practices
|
||||
- Regular technology strategy reviews
|
||||
|
||||
## SIGNATURES
|
||||
|
||||
|
Reference in New Issue
Block a user