Incident Response Policy

Applicable to: All employees, contractors, and third parties handling POPCUSTOMS & PILLAR SUPPLY LLC data or systems.

1. Purpose

POPCUSTOMS & PILLAR SUPPLY LLC is committed to maintaining a secure environment for our customers, employees, and partners. This Incident Response Policy (IRP) establishes clear procedures for identifying, containing, eradicating, and recovering from security incidents to minimize business impact and ensure compliance with legal and regulatory requirements.

2. Scope

This policy applies to all:

  • IT systems, cloud infrastructure, and corporate networks
  • Employees, contractors, and authorized third parties
  • Data breaches, cyberattacks, system failures, and other security events

3. Incident Classification

We categorize incidents based on severity:

LevelImpactExampleResponse Time
P1 (Critical)High business/customer impactRansomware, major data breachImmediate (24/7)
P2 (Major)Significant operational disruptionUnauthorized access, DDoSWithin 4 hours
P3 (Minor)Limited impactPhishing attempt, malware detectionWithin 24 hours

4. Roles & Responsibilities

  • Security Team (CSIRT): Lead technical investigation and containment.
  • Legal/Compliance: Ensure GDPR, CCPA, or other regulatory reporting.
  • IT Operations: Execute system recovery and patches.
  • PR/Communications: Manage customer/partner notifications.
  • Executive Management: Approve major actions (e.g., system shutdown).

5. Incident Response Process

Step 1: Detection & Reporting

  • Employees report incidents via:
    • Email: business@popcustoms.com
    • Automated monitoring alerts (SIEM/SOC).

Step 2: Assessment & Containment

  • CSIRT evaluates severity and isolates affected systems.
  • Legal team determines breach notification requirements.

Step 3: Eradication & Recovery

  • Remove threats (e.g., malware, compromised accounts).
  • Restore systems from clean backups.

Step 4: Post-Incident Review

  • Conduct a Root Cause Analysis (RCA).
  • Update policies/training to prevent recurrence.

6. Communication

  • Internal: Updates to stakeholders via [Slack/Email].
  • Regulators: Reported per legal requirements (e.g., 72 hours under GDPR).
  • Customers/Public: Disclosed only if data is compromised (approved by Legal/PR).

7. Training & Testing

  • Annual tabletop exercises for CSIRT.
  • Employee security awareness training.

8. Policy Compliance

Violations may result in disciplinary action. Exceptions require CISO approval.