Breach Response Playbooks
When an incident happens, you need a fast, documented response. Compliance AI includes 14 pre-built playbooks for common scenarios. Use as-is or customize to your organization.
Available Playbooks
- Data Breach (General) — Unauthorized access, loss, or theft of data
- Model Compromise — Model weights leaked, model stolen, model poisoned
- Training Data Exposure — Training data accidentally exposed
- EU AI Act Article 73 Incident — High-risk AI system failure
- GDPR Article 33 Breach — Personal data breach requiring 72-hour notification
- HIPAA Breach — PHI exposure in healthcare system
- CCPA Breach — California resident personal data exposed
- Ransomware — Systems encrypted by attacker, recovery plan
- Insider Threat — Malicious employee access
- Third-Party Vendor Compromise — Vendor security incident
- Biometric System Failure — Facial recognition or biometric data exposed
- Model Bias Incident — System produces discriminatory decisions
- Automated Decision Failure — AI makes catastrophic autonomous decision
- Incident Investigation — General incident response framework
How to Use a Playbook
- Go to Compliance > Incident Management > [System] > New Incident
- Select incident type (see list above)
- Choose template playbook
- Compliance AI fills in:
- Incident assessment criteria (is this actually the incident type?)
- Notification requirements (who to notify, timeline)
- Investigation steps (collect evidence, root cause)
- Response actions (remediate, communicate)
- Post-incident review
- Customize based on your organization:
- Change notification contacts (your DPO, security team, legal)
- Adjust timeline (72 hours for GDPR, 60 for HIPAA)
- Add internal stakeholders
- Start incident response
Next Steps
- Create an incident: Go to Compliance > Incident Management > New Incident
- Track notifications: Authority Notifications
- Document timeline: Incident Timeline