Legal
Incident Response Policy
What happens at Zerix in the event of a security incident or data breach: detection, containment, notification, remediation.
Last updated: 1 October 2025
In the unlikely event of a security incident or data breach, Zerix follows a structured response plan to ensure rapid containment and transparent communication.
Incident response steps
- Detection and verification. Anomalies are automatically flagged via platform monitoring tools.
- Containment. Affected systems are isolated immediately.
- Assessment and reporting. The issue is assessed within 24 hours, and affected customers are notified promptly if their data may be impacted.
- Remediation and review. Vulnerabilities are corrected, and a root-cause analysis is completed within 72 hours where possible.
All incidents are logged, reviewed and reported in line with UK GDPR Article 33 (72-hour notification window).