Security compliance workflow for Tallyfy

Respond to data breaches before deadlines pass

GDPR gives you 72 hours from when you know about a breach. State laws vary. This Tallyfy template guides privacy officers and IT security through identification, containment, notification, and remediation - with structure to stay compliant when the clock is ticking.

7 steps
3 automations

Run this workflow in Tallyfy

1
Import this template into Tallyfy and launch it immediately when a breach is discovered, assigning steps to your IT security, legal, and communications teams
2
Use Tallyfy's 1-day deadlines on all 7 steps to keep your response moving fast - from breach identification through containment, scope assessment, regulatory notification, and customer communication
3
Track your breach response through Tallyfy so you have documented evidence of containment actions, notification timing, and remediation steps for the inevitable regulatory review
Import this template into Tallyfy

Process steps

1

Identify the breach

1 day from previous step
task
Something's leaked. Figure out what data, how much, and how it happened. The clock starts now. Document the exact time you became aware. For GDPR, you've got 72 hours from when you 'know' - not when you're done investigating. The timeline matters.
2

Contain the breach

1 day from previous step
task
Stop more data from leaking. Disable compromised accounts. Close exposed endpoints. Do it now. Contain first, investigate later. Every minute the breach spreads is more customers affected and more regulators asking questions.
3

Determine scope and impact

1 day from previous step
task
What data was exposed? How many people? Which jurisdictions? This determines your notification obligations. Be thorough but fast. You need answers to tell regulators and customers. Guessing wrong in either direction causes problems.
4

Notify legal and regulatory authorities

1 day from previous step
task
72 hours for GDPR notification. State laws vary - some are faster. Your legal team needs to know immediately. Don't wait until you have all the answers. Regulators understand you're still investigating. What they don't forgive is silence.
5

Notify affected customers

1 day from previous step
task
Be honest, be clear, be helpful. Tell them what happened, what you're doing about it, and what they should do. Offer credit monitoring if financial data was exposed. It's expensive, but cheaper than the lawsuit.
6

Implement remediation

1 day from previous step
task
Fix what broke. Patch the vulnerability. Change the credentials. Whatever let this happen, make sure it can't happen again. Don't just fix the symptom. Find the root cause. If it was a phishing email, why did your controls fail?
7

Complete post-breach analysis

1 day from previous step
task
What did we learn? What needs to change? Document everything for the inevitable regulatory review. This isn't just bureaucracy. Regulators will ask what you've done to prevent recurrence. Have a good answer ready.

Ready to use this template?

Sign up free and start running this process in minutes.