Skip to main content
All CollectionsSecurity and Data Privacy
What actions does Cedar take in case of a security incident or data breach?
What actions does Cedar take in case of a security incident or data breach?
Updated over a week ago

Overview

Cedar is committed to the security of your personal data and follows a strict Incident Response Framework to handle any security incidents or data breaches. In the unlikely event that a data breach occurs, we take swift and decisive action to protect your rights and freedoms.

Actions Taken in the Event of a Data Breach:

  1. Incident Assessment

    • Once a security incident is identified, our security team quickly assesses the situation to understand the scope of the breach and its potential impact on user data.

  2. Notification to Data Protection Authorities

    • If a breach involves user data and impacts rights and freedoms, Cedar will promptly report the incident to the relevant Data Protection Authority in accordance with applicable laws and regulations, such as the General Data Protection Regulation (GDPR).

  3. Notification to Affected Users

    • If the breach is likely to affect users' rights and freedoms, Cedar will notify affected users directly. The notification will include details about the nature of the breach, the data affected, and the steps Cedar is taking to resolve the issue.

  4. Mitigation Measures

    • Cedar will take immediate actions to mitigate the effects of the breach, which may include measures to secure systems, update security protocols, and prevent similar incidents from happening in the future.

  5. Ongoing Monitoring

    • We continuously monitor our systems for signs of malicious activity and undertake regular security audits to prevent breaches from occurring.

Your Rights and Actions:

In the event of a data breach, you have the right to know how it affects your data and what steps are being taken. Cedar is committed to transparency and will provide you with all necessary information in case your data is compromised.

For more information on how we handle data protection, please review our Privacy Policy.

Did this answer your question?