Skip to main content

Policy on Consequences of Breaches of IT Security

1 Scope

2 Breach of information security

3 Consequences

4 Other provisions

Appendix