Your data doesn't train Genie's AI
You keep IP ownership聽of your docs
1. Incident Overview: Basic information including incident ID, date/time of detection, reporter details, and initial severity assessment
2. Incident Classification: Categorization of the incident type (e.g., data breach, system outage, cybersecurity attack) and initial impact assessment
3. Incident Details: Detailed description of the incident, including systems affected, data compromised, and initial symptoms observed
4. Initial Response Actions: Immediate steps taken to contain or mitigate the incident, including timestamp of actions
5. Impact Assessment: Evaluation of the incident's impact on business operations, data, systems, and stakeholders
6. Regulatory Compliance: Documentation of applicable UAE regulatory requirements and notification obligations
7. Response Team Details: List of personnel involved in incident response, including roles and contact information
8. Resolution Actions: Description of steps taken to resolve the incident and prevent recurrence
9. Communication Log: Record of all internal and external communications related to the incident
1. External Vendor Involvement: Details of any third-party vendors involved in the incident or response, used when external parties are involved
2. Law Enforcement Notification: Documentation of law enforcement involvement and contact details, included when criminal activity is suspected
3. Data Privacy Impact: Specific section for incidents involving personal data breaches, required when personal data is compromised
4. Business Continuity Measures: Documentation of business continuity procedures activated, included for severe incidents affecting operations
5. Cost Impact Analysis: Assessment of financial impact and recovery costs, optional for incidents with significant financial implications
6. Media Response Plan: Communication strategy for public relations, included when public disclosure is necessary
1. Appendix A - Evidence Collection Log: Detailed log of all evidence collected during the incident investigation
2. Appendix B - System Logs: Relevant system, security, and application logs related to the incident
3. Appendix C - Affected Assets Inventory: List of all IT assets and systems affected by the incident
4. Appendix D - Contact Directory: List of all relevant contact information for incident response team and stakeholders
5. Appendix E - Incident Timeline: Detailed chronological timeline of the incident and response actions
6. Appendix F - Post-Incident Review: Analysis of the incident response effectiveness and lessons learned
Find the exact document you need
Security Guard Report Form
UAE-compliant Security Guard Report Form for documenting security operations and incidents during guard shifts, aligned with SIRA regulations and federal requirements.
Health And Safety Incident Report Form
UAE-compliant workplace incident reporting form for documenting health and safety events, aligned with federal and emirate-specific regulations.
Hazard Incident Report Form
UAE-compliant hazard incident reporting form for documenting workplace accidents, injuries, and near-misses in accordance with Federal Law No. 8 of 1980 and related safety regulations.
Work Place Injury Report Form
UAE-compliant Workplace Injury Report Form for documenting and reporting occupational accidents and injuries as required by UAE Federal Labor Law.
Employee Incident Report Form
A comprehensive workplace incident reporting form designed to comply with UAE labor laws and safety regulations, facilitating systematic documentation of workplace accidents and incidents.
Critical Incident Report Form
UAE-compliant form for documenting workplace critical incidents, accidents, and near-misses, aligned with Federal Law No. 8 of 1980 and related regulations.
Incident Response Form
UAE-compliant incident response documentation template for recording and managing security incidents in accordance with local cybersecurity regulations.
Incident Investigation Form
A UAE-compliant form for systematically recording and investigating workplace incidents, ensuring comprehensive documentation and analysis in accordance with local labor laws.
骋别苍颈别鈥檚 Security Promise
Genie is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
