(Q123684246)
Statements
1 reference
3.2.6 Incident Prioritization / p.32 / p.33 / Table 3-3 provides examples of possible information impact categories that describe the extent of information compromise that occurred during the incident. In this table, with the exception of the ‘None’ value, the categories are not mutually exclusive and the organization could choose more than one. / Table 3-3. Information Impact Categories (English)
1 reference
3.2.6 Incident Prioritization / p.32 / p.33 / Table 3-3 provides [...] / Table 3-3. Information Impact Categories / Category: Privacy Breach / Definition / Sensitive personally identifiable information (PII) of taxpayers, employees, beneficiaries, etc. was accessed or exfiltrated (English)
1 reference
3.2.6 Incident Prioritization / p.32 / p.33 / Table 3-3 provides [...] / Table 3-3. Information Impact Categories / Category: Proprietary Breach / Definition / Unclassified proprietary information, such as protected critical infrastructure information (PCII), was accessed or exfiltrated (English)
1 reference
3.2.6 Incident Prioritization / p.32 / p.33 / Table 3-3 provides [...] / Table 3-3. Information Impact Categories / Category: Integrity Loss / Definition / Sensitive or proprietary information was changed or deleted (English)
no value
(None)
1 reference
3.2.6 Incident Prioritization / p.32 / p.33 / Table 3-3 provides [...] / Table 3-3. Information Impact Categories / Category: None / Definition / No information was exfiltrated, changed, deleted, or otherwise compromised (English)