Security

Because some incident information is sensitive, voice, data, networks, and systems should be secure to the appropriate level to control access to sensitive or restricted information.

For example, law-enforcement may discuss sensitive, personally identifiable or classified information and must ensure this information is shielded in accordance with applicable laws.

Additionally, incident communications and information sharing should comply with data protection and privacy laws. 

Hands reaching out of a computer screen towards a person standing in front of it.