Policy on Consequences of Breaches of IT Security

1 Scope

2 Breach of information security

3 Consequences

4 Other provisions