Responding to Data Breaches

The Archer Cyber Incident & Breach Response use case is built to enable the following breach response workflow.

Data Breach Response workflow

Note: Only notifications that are a key part of the workflow are included in the diagram. For a complete list of notifications, see the Data Dictionary.