Information Security Incident Procedure
Updated 27.01.2026
A document forming part of the Immercial IMS.
12. Information Security Incident Procedure
Document Name: Information Security Incident Procedure
Version: 1.0
Approved by: Directors, Immercial Limited
Review Frequency: Annual or upon material change
12.1 Purpose
This procedure defines how Immercial Limited identifies, records, responds to, and reviews information security incidents to minimise impact and support continual improvement.
It supports ISO 27001 requirements and aligns with Cyber Essentials principles.
12.2 Definition of an Information Security Incident
An information security incident is any event that may compromise, or has the potential to compromise:
-
Confidentiality of information
-
Integrity of information
-
Availability of information or systems
Incidents may include, but are not limited to:
-
Unauthorised access to data
-
Loss or theft of devices
-
Accidental data disclosure
-
Malware or cyber-related events
-
System outages affecting availability
12.3 Incident Identification & Reporting
-
All personnel and authorised users must report suspected or actual incidents as soon as they are identified.
-
Incidents are reported to senior management without delay.
-
No blame is attributed to incident reporting; early reporting is encouraged.
12.4 Incident Recording
All incidents are recorded in an Incident Log, including:
-
Date and time identified
-
Description of incident
-
Information assets affected
-
Initial assessment of impact
-
Actions taken
-
Resolution status
-
Lessons learned (if applicable)
Incidents with no material impact are still recorded.
12.5 Incident Response
Senior management is responsible for:
-
Assessing the severity and potential impact
-
Implementing immediate containment actions
-
Coordinating remediation activities
-
Engaging third-party support where required
-
Determining whether further notification is necessary
12.6 Post-Incident Review
Following resolution:
-
The incident is reviewed to identify root causes where appropriate
-
Additional controls or improvements are identified
-
Corrective or preventive actions are logged where required
12.7 Integration with IMS
Information security incidents and responses form part of:
-
Risk management activities
-
Corrective and preventive action processes
-
Management review inputs
12.8 Review & Improvement
This procedure is reviewed annually or following a significant incident to ensure continued suitability and effectiveness.
