Kornit X Security Notification Policy
Security Incident Notification Procedures
This document forms the security incident notification procedures for all staff and contractors working for and on behalf of Kornit X.
Suspected Data Breaches
If you suspect that there has been a data breach in any way you should make your line manager aware as soon as possible. This could include but is not limited to.
Your work computer or other device has been lost / compromised (with a virus for example)
You believe the Office has been accessed by unauthorised persons
You have broken one of the information security policy points
You have been sent and or opened suspicious emails or files
You believe PII (Personally identifiable information) from anywhere inside the platform may have been accessed.
Kornit X Escalation Path
Any suspected breach should be reported by the individual who identified it to their direct line manager.
Their line manager should verify and escalate immediately to the Chief Technical Officer who will then
proceed with investigation, remediation and communication procedures.
Incident Reporting
Kornit X will provide incident reports to all affected parties in the event of a security breach within 48 hours of identification.
Incident reports will contain a full summary and detail of the impact and its resolution.
Incident reports will be shared with the primary contact we have on record for affected clients.
Related Articles
Notification Integration | Generic Filesystem
Introduction This article has been created to show how to setup the Notification Integration that Kornit X has built to connect to a Generic Filesystem Setup To setup the Generic Filesystem Notification integration, please head to your company and ...
Notification Integration | Reviews.io
Introduction This article has been created to show how to setup the Notification Integration that Kornit X has built to connect to Reviews.io. Setup To setup the Reviewss.io Notification integration, please head to your company and within the ...
Notification Integration | AfterShip
Introduction Kornit X has built a notification integration with the third party software AfterShip which sends automated shipment tracking to customers in an aim to increase brand loyalty and driving sales. For more information on AfterShip, please ...
Kornit X User Management Policy
User Access Management Policy This document forms the User Access Management Policy for all staff and contractors working for and on behalf of Kornit X. Staff access to OMS and CPP Staff will only be issued with a STAFF level access to the Platform ...
Kornit Pallet names and sizes
As of February 2024, this article is up to date with all current Kornit Machine pallet sizes When setting up your Kornit workflow, you will need to make sure the artwork generated by the system has the correct naming convention. If the item doesn't ...