DATA BREACH NOTIFICATION POLICY

Ultimate Global Compliance Edition – GDPR / KVKK / CPRA / LGPD / ISO 27001


Profylee (“Platform”, “Company”) recognizes the protection of personal data and system security as a top priority. This Data Breach Notification Policy (“Policy”) outlines the procedures for detecting, assessing, responding to, and reporting personal data breaches; as well as notifying users and regulators in compliance with international standards.

This Policy is prepared in accordance with GDPR Articles 33–34, KVKK, CPRA/CCPA, LGPD, OECD Privacy Principles, NIST Incident Response Framework, and ISO/IEC 27001 + 27701 requirements.



1. PURPOSE AND SCOPE

The purpose of this Policy is to ensure:

  1. Timely detection of data breaches

  2. Quick and effective mitigation of risk

  3. Proper notification to regulatory authorities

  4. Transparent communication with affected users

  5. A clear, documented incident response process

This Policy applies to all Profylee modules, including:

  1. AI-Powered Digital Identity

  2. Works (Freelance Marketplace)

  3. Flow & Pool (Hiring Pipeline)

  4. Message

  5. Wallet

  6. Analytics & Insight

  7. Showcase, Publish, Wall

  8. Calendar (Google API) integrations

  9. OpenAI anonymized AI processing



2. DEFINITIONS

Personal Data Breach:

Unauthorized access, disclosure, loss, theft, alteration, destruction, or compromise of personal data.

Unauthorized Access:

Any access performed without the data subject’s consent or valid legal basis.

Data Subject:

Any Profylee user (Client, Freelancer, individual user, company representative).

Supervisory Authority / Regulator:

GDPR Data Protection Authority (DPA), KVKK Authority, California Privacy Protection Agency, ANPD (Brazil), etc.



3. BREACH DETECTION & INITIAL ASSESSMENT

Profylee uses multiple mechanisms to detect possible data breaches:

  1. Continuous log and event monitoring

  2. Anomaly detection systems (IDS/IPS)

  3. Suspicious login pattern alerts

  4. Unauthorized data transfer detection

  5. CDN / server-side irregular traffic monitoring

  6. User or third-party reports

Upon suspicion of a breach, Profylee initiates an Immediate Preliminary Assessment.



4. INCIDENT RESPONSE TEAM (IRT)

In the event of a suspected or confirmed breach, the following team is activated:

  1. Data Protection Officer (DPO)

  2. Security & DevOps Team

  3. Legal & Compliance Team

  4. Communications Team

  5. Executive Leadership

The IRT coordinates containment, investigation, communication, and remediation.



5. BREACH CLASSIFICATION

Profylee categorizes breaches into three levels:

1) Low-Level Incident

No personal data exposure; minimal/no risk.

(E.g., harmless system log anomalies.)

2) Medium-Level Incident

Potential exposure of personal data; moderate risk.

3) High-Level Incident

Confirmed or likely exposure of personal data to unauthorized parties.

→ Requires mandatory regulatory and user notification.




6. NOTIFICATION OBLIGATIONS

6.1. Notification to Supervisory Authorities

GDPR

High-risk personal data breaches must be reported to the relevant Data Protection Authority within 72 hours of detection.

KVKK (Turkey)

Breach must be reported to the KVKK Authority as soon as possible (commonly 72 hours).

CPRA/CCPA (California & U.S.)

Breaches affecting California residents must be notified as required under CPRA/CCPA.

LGPD (Brazil)

The ANPD must be notified within a “reasonable time” (typically 2–5 working days).



6.2. Notification to Users

Profylee notifies affected users without undue delay when:

  1. Sensitive personal data is compromised

  2. Account access or password integrity is at risk

  3. Identity theft or fraud risk exists

  4. Wallet or payment data is affected

  5. Credentials, tokens, or session keys are exposed

The notification includes:

  1. Nature of the breach

  2. Categories of affected data

  3. Potential risks to the user

  4. Measures taken by Profylee

  5. Recommended protective steps

  6. Contact point for further information

Notification channels:

  1. Email

  2. In-platform notification

  3. SMS (if necessary)

  4. Public notice (in large-scale breaches)



7. INCIDENT RESPONSE ACTIONS

Upon detection of a breach, Profylee immediately:

  1. Suspends access to affected systems

  2. Resets passwords, API keys, tokens

  3. Secures all log data as forensic evidence

  4. Applies patches and blocks malicious traffic

  5. Temporarily restricts user actions (if needed)

  6. Notifies third-party providers (OpenAI, PayTR, Paddle, Google API, hosting providers)

  7. Conducts forensic analysis to determine the scope




8. ROOT CAUSE ANALYSIS (RCA)

Profylee investigates:

  1. How the breach occurred

  2. Whether unauthorized access was intentional or accidental

  3. Whether third-party providers were involved

  4. Whether a configuration vulnerability existed

  5. Whether the issue resulted from human error

  6. What data categories were affected

Findings are documented in an RCA report.



9. POST-BREACH REMEDIATION

Following an incident, Profylee applies:

  1. Systems hardening

  2. Enhanced MFA / 2FA requirements

  3. Strengthened encryption measures

  4. Improved log and access monitoring

  5. Security patching and code review

  6. Staff training for security awareness

  7. Legal action when necessary



10. DOCUMENTATION & RECORD KEEPING

As required under GDPR Article 33(5) and KVKK:

Profylee records every breach, including:

  1. Date/time of incident

  2. Nature and scope of the breach

  3. Affected data categories

  4. Mitigation steps taken

  5. Notifications sent

  6. RCA results

  7. Remediation actions

Records are maintained for a minimum of 3 years.



11. USER RESPONSIBILITIES

Users must:

  1. Use strong passwords

  2. Avoid sharing credentials

  3. Protect access to devices

  4. Immediately report suspicious account activity

  5. Avoid uploading harmful or unlicensed content

  6. Secure third-party-linked accounts



12. POLICY UPDATES

Profylee may update this Policy based on:

  1. Legal changes

  2. Security requirements

  3. Industry standards

  4. Platform updates

Significant updates will be communicated to users.



13. CONTACT INFORMATION

For reporting a security incident or asking questions:

📩 [contact@example.com]