Breach Handling Policy

CARDWATCH POS

Breach Handling Policy

1. Purpose

This Breach Handling Policy outlines Cardwatch’s approach to identifying, managing, and mitigating data security breaches. It ensures compliance with relevant legislation and maintains the trust of our clients in the healthcare, senior living, and higher education sectors.

2. Scope

This policy applies to all employees, contractors, and third-party vendors who access Cardwatch systems, networks, or data.

3. Definitions

  • Data Breach: Unauthorized access, disclosure, or loss of personal, financial, or health information.
  • PII: Personally Identifiable Information.
  • PHI: Protected Health Information, as applicable under HIPAA or similar regulations.

4. Breach Identification

All personnel are required to report suspected breaches immediately to the IT and Compliance teams via the internal security incident portal or emergency communication channels.

5. Breach Response Team (BRT)

Comprised of representatives from IT, Legal, Compliance, Product, and Customer Success teams. The BRT is responsible for:

  • Confirming the breach.
  • Assessing impact and affected systems.
  • Containing and mitigating the breach.
  • Communicating with affected parties.

6. Investigation & Containment

  • Initiate logs and audit trails.
  • Isolate affected systems.
  • Patch vulnerabilities.
  • If third parties are involved, notify them under contractual obligations.

7. Notification & Reporting

  • Notify affected clients within 72 hours of breach confirmation.
  • Report incidents to applicable regulators (e.g., PHIPA, HIPAA, PIPEDA, GDPR).
  • Provide breach impact assessment and remediation plan.

8. Post-Incident Review

  • Conduct internal review within 10 business days.
  • Update security protocols, training, and breach prevention procedures.
  • Document breach handling report and lessons learned.

9. Training & Awareness All employees receive annual training on breach identification, reporting protocols, and data protection responsibilities.

10. Roles & Responsibilities

RoleResponsibilities
IT Security LeadIdentifies and contains breaches, preserves evidence, coordinates technical forensics.
Compliance OfficerReviews legal obligations (HIPAA, PHIPA, GDPR), ensures regulatory reporting.
Customer SuccessCoordinates client communication and support.
Legal CounselReviews notification language, regulatory obligations, and mitigates liability.
Executive SponsorApproves major decisions (public disclosures, service suspensions, compensation).

11. Breach Severity & Escalation

Severity TierDefinitionResponse Time
Tier 1 – MinorUnauthorized access to non-sensitive data; limited internal exposure.24 hours
Tier 2 – ModerateUnauthorized access to PII or PHI affecting ≤ 50 individuals.12 hours
Tier 3 – MajorLarge-scale compromise (e.g. ≥ 50 individuals, or system-wide breach).4 hours

Each tier invokes a specific incident protocol including containment, root cause analysis, and stakeholder reporting. Tier 3 incidents must trigger executive notifications and PR coordination.

12. Regulatory Framework Compliance

HIPAA (U.S. Healthcare)

  • Notify affected individuals within 60 days.
  • Report to HHS if breach affects 500+ individuals.
  • Maintain documentation for 6 years.

PHIPA (Ontario Health Information)

  • Mandatory reporting to Ontario’s Information and Privacy Commissioner.
  • Notification to individuals as soon as feasible.
  • Logging of all breaches, regardless of severity.

GDPR (EU Residents, if applicable)

  • Notify supervisory authority (e.g., EDPB) within 72 hours.
  • If high risk, notify affected data subjects without undue delay.
  • Maintain a Data Breach Register under Article 33 & 34.

13. Breach Notification Template

Subject: Important Security Notification from Cardwatch POS

Dear [Customer Name],

We are writing to inform you of a recent security incident that may have involved your personal data. On [Date], we detected unauthorized access to [Brief description: “a system containing client profiles and purchase history”].

What Happened:
[Insert summary of the breach, impact, and duration.]

What We Are Doing:

  • The breach was contained within [X hours].
  • Forensic investigation is ongoing.
  • We are enhancing system safeguards, including [describe: MFA, updated firewall, vendor audits].

What You Can Do:

  • Monitor your account statements for suspicious activity.
  • Contact us at security@cardwatchpos.com if you have concerns or require assistance.

We sincerely regret any inconvenience and remain committed to data security.

Sincerely,
[Cardwatch Executive Contact Info]

14. Additional Measures

  • Audit Trails: Full logs of user access and system changes are reviewed during breach investigations.
  • Privacy by Design: All system enhancements undergo threat modeling and DLP reviews.
  • Penetration Testing: Conducted semi-annually or post-breach.

Privacy Policy for Cardwatch POS

1. Introduction

Cardwatch POS values the privacy and security of our clients’ and users’ data. This Privacy Policy describes how we collect, use, store, and protect personal and sensitive information.

2. Scope

This policy covers all digital services and platforms offered by Cardwatch, including POS systems, mobile/web apps, kiosks, and integrated CRM solutions.

3. Data We Collect

  • Customer data (name, contact info, user IDs)
  • Payment details (card or plan-based transactions)
  • Health and dietary preferences (in senior living/healthcare contexts)
  • Usage logs and technical device data (for service optimization)

4. Use of Information

  • To deliver and improve POS functionalities.
  • To personalize user experience (menus, dietary restrictions).
  • For troubleshooting, fraud detection, and security.
  • To comply with legal and contractual obligations.

5. Data Sharing We do not sell or rent data. We may share it with:

  • Trusted service providers (e.g., cloud hosting, analytics) under strict data processing agreements.
  • Regulatory authorities when legally required.
  • Integrated third-party apps only upon client request (e.g., dietary databases, billing systems).

6. Data Retention

We retain data for as long as necessary to fulfill the purposes outlined or to comply with legal requirements. Data is securely destroyed when no longer needed.

7. Data Security

  • Encrypted storage and transmission
  • Role-based access control (RBAC)
  • Regular vulnerability assessments
  • Secure coding and privacy-by-design practices

8. Your Rights Clients and users have the right to:

  • Access their data
  • Correct or update inaccuracies
  • Request deletion, subject to legal constraints
  • Opt-out of certain data uses

9. Contact Us

For privacy concerns, data access requests, or questions, contact: privacy@cardwatchpos.com


These policies are reviewed annually and updated as required by changes in law, technology, or Cardwatch business operations.