Skip to main content

How to write your own Security Breach Report Form

You can create your own customized editable version of this contract document using IT/Software/Hardware Contract Pack. Follow these steps to get started.


Use the Security Breach Report Form to file a report about a security breach either involving a physical breach or a computer breach.
Document Length: 6 Pages
Business proposal example What Our Clients Say

Before I used the Web Freelancer Contract Pack, I would often find myself forgetting to include items in my agreements with clients that lead to frustration, usually on my part. This contract pack has allowed me to keep a consistent look to my client documents, and helped me be more proactive and helpful to my clients, by covering all of the bases I need to cover."

Richard Pelzar
Webbit Media LLC.

1. Get IT/Software/Hardware Contract Pack that includes this business contract document.

This Security Breach Report Form is included in editable Word format that can be customized in Word or by using the included Wizard software.

2. Download and install after ordering.

Once you have ordered and downloaded your IT/Software/Hardware Contract Pack you will have all the content you need to get started with your own formal declaration.

3. Customize the contract template with your own information.

You can customize the contract document as much as you need. You can also use the included Wizard software to automate merging in name/address data.

Security Breach Report Form

How do you write a Security Breach Report Form document?

Incident Report: Security Date Reported: Current Date. Employee: First Last Department: Department Supervisor: Supervisor Date / Time of Injury: Insert Incident Date and Time. Point of Contact (POC) Information Name: Phone: Job title of signator, authorized signature or signer.

Point of Contact must complete the following form and file it with the Security Department as well as the Human Resources Department. The following is a high-level description of the incident for summary purposes only. Distribution of this report is limited to the following departments on a NEED-TO-KNOW basis only.

If you have any questions related to this summary, please contact at method for more information. Description of Incident / Intrusion Describe the injury as well as the events or what happened to cause this incident. Attach additional pages if necessary.

Witnesses Did anyone witness the incident or evidence of the incident after it occurred?

Yes ? No ? Name(s) of Witnesses:

Type of Intrusion (Please check all that apply) Intrusion ? Data Breach ? Theft ? Malware/Trojan/Virus ? Compromised System ? Physical Intrusion ? Other ?

Intrusion Location and Information: (Name, Address, Phone if applicable) Notes:

Effect of Intrusion (Please check all that apply. Loss of Data ? Unauthorized Access of Data ? Theft ? Degradation of Service(s) ? Interruption of Service ? Physical Damage to System(s) ? Unauthorized Escalation of Privileges ?

Physical Intrusion ? Other ?

Additional Information:

Systems Affected

Insert the systems this intrusion affected.

Intrusion Discovery

Describe how, where, and by whom this intrusion was first detected.

Communication / Notification

Describe the notifications and communication that were carried out at every step. Also describe any initial notification, follow-up, resolutions and communication(s) that still need to be made at this stage.

Evidence and Documentation

Describe the evidence and documentation, logging, files, etc., that have been gathered at each step, and indicate by whom they were gathered. Attach additional sheets if necessary.

Incident Response

Describe the work flow of the incident response, including personnel involved at each stage and all actions taken. Attach additional sheets if necessary. Corrective Action(s) Taken and Incident Resolution. Describe the corrective actions taken, including names of parties responsible for those actions, to address each system impacted by the intrusion.

Attach additional sheets if necessary.

Conclusion and Findings

Insert conclusions reached at this stage. Attach additional sheets if necessary.

Conclusions may include:

The root or proximate cause of this incident. Precautions that could have prevented this. The direct and indirect impact on the Company and its systems, customers, users, employees, etc.

The estimated cost to investigate, respond to, and correct the intrusion. The steps that have been taken to prevent the incident from happening again and to limit further interruption. The additional actions, research or communication that need to happen.

The complete Security Breach Report Form - with the actual formatting and layout - is available in this Contract Pack.
Produced by:
Proposal Kit
Software › Computer Software › Business & Productivity Software
$89 USD
Add To Cart ($89)
Proposal Kit reviews4.9 stars, based on 837 reviews
Related documents may be used in conjunction with this document depending on your situation. Many related documents are intended for use as part of a contract management system.

Related Documents:
Disclaimers: Proposal Kit, Inc. makes no warranty and accepts no responsibility for suitability of any materials to licensees business. Proposal Kit, Inc. assumes no responsibility or liability for errors or inaccuracies. Licensee accepts all responsibility for results obtained. Information included is not legal advice. Use of any supplied materials constitutes acceptance and understanding of these disclaimers and terms and conditions.
Proposal KitPublished by Proposal Kit, Inc.
Create winning business proposals & contracts with minimal effort and cost. Downloadable proposal software, proposal templates, legal contracts and sample proposals.
© 1997 - 2023, Proposal Kit, Inc. All rights reserved.
Proposal Kit

Create winning business proposals & contracts with minimal effort and cost. Proposal software, proposal templates, legal contracts and sample proposals.