How We Handle Safety Incidents
AskBiz's process for responding to security incidents, data breaches, and platform safety events. What we do, how fast, who we notify, and what your rights are.
Our Incident Response Principles
When a security or safety incident occurs, AskBiz operates on four principles:
1. Contain first โ stop the incident from spreading before anything else
2. Investigate thoroughly โ understand exactly what happened and what data was affected
3. Notify promptly and transparently โ tell affected users what happened in plain English, not legal boilerplate
4. Remediate and learn โ fix the root cause and document what we improved
We do not prioritise managing our reputation over your right to know what happened.
Security Incident Classification
We classify incidents by severity:
P1 โ Critical: Confirmed unauthorised access to user data, active breach, or service-wide authentication failure. Response begins within 1 hour of detection, 24/7.
P2 โ High: Suspected data exposure (unconfirmed), significant service degradation, or a single user account confirmed compromised through platform vulnerability. Response begins within 4 hours.
P3 โ Medium: Attempted breach (blocked), minor data exposure with no confirmed exfiltration, or a security misconfiguration without active exploitation. Response within 1 business day.
P4 โ Low: Security configuration improvements, minor policy violations, or theoretical vulnerabilities. Addressed in normal development cycle.
Data Breach Notification โ Legal Requirements We Follow
AskBiz complies with breach notification requirements under three frameworks:
UK GDPR / Data Protection Act 2018: We must notify the ICO (Information Commissioner's Office) within 72 hours of becoming aware of a breach that is likely to result in a risk to individuals' rights and freedoms. If the breach is likely to result in a high risk to you personally, we notify you without undue delay โ meaning as soon as practicable, not just within 72 hours.
EU GDPR: Same 72-hour obligation to the relevant supervisory authority (e.g. the Irish DPC, given our data is stored in Dublin). Equivalent individual notification obligations apply.
US state laws: Several US states have breach notification laws (California CCPA/CPRA, New York SHIELD Act, etc.). We comply with all applicable state notification requirements, which generally require notification within 30โ72 days of discovery depending on the state.
In plain terms: if your data is involved in a breach, we will tell you as quickly as possible โ not hide it.
What a Breach Notification From AskBiz Looks Like
If you are affected by a breach, you will receive an email from security@askbiz.co that includes:
- What happened โ a plain-English description of the incident
- When it happened โ the date of the incident and the date we discovered it
- What data was affected โ specifically which categories of data were involved (e.g. 'email addresses and hashed passwords' or 'Shopify OAuth tokens for accounts connected before [date]')
- What data was NOT affected โ to be clear about the scope
- What we have done โ steps taken to contain and remediate
- What you should do โ specific recommended actions (e.g. change your password, revoke API keys)
- Who to contact โ a direct contact for questions
We will not send vague or generic notifications. We will not say 'potentially some data may have been affected' โ we will tell you what we know and what we do not yet know.
Platform Safety Events
Beyond data breaches, AskBiz monitors for other safety events:
AI-generated harm: If an AI response causes harm โ for example, generating false financial data that a user relied on for a significant decision โ we investigate the root cause, update our AI guardrails, and contact the affected user directly.
Service misuse: If AskBiz is used to facilitate fraud or illegal activity, we suspend the account, preserve evidence, and cooperate with law enforcement. We may notify other affected parties where we are legally permitted to do so.
Third-party platform security events: If Shopify, Amazon, or another connected platform suffers a breach that may affect our integration (e.g. their OAuth tokens are compromised), we proactively revoke and regenerate all affected tokens and notify connected users.
Supply chain incidents: If one of our infrastructure providers (Vercel, Supabase, Anthropic) reports a security incident, we assess the impact on AskBiz users and notify accordingly.
Post-Incident Review
After every P1 or P2 incident, AskBiz conducts a written post-incident review within 30 days. The review covers:
- Root cause analysis
- Timeline of events
- What our monitoring did and did not detect
- What we have changed to prevent recurrence
- Any systemic improvements to our security posture
For significant incidents (those affecting more than a small number of users, or involving confirmed data exfiltration), we publish a public summary of the incident and our response. We believe transparency after security incidents builds trust โ hiding them erodes it.