If you roll out AI broadly, you will eventually have a data incident — confidential information pasted into the wrong tool, an output sent to the wrong customer, a vendor data exposure. Here's the incident response playbook that contains the damage and rebuilds trust.
5-step response: (1) contain immediately — revoke access if needed, (2) assess scope — what data, what tool, who knew, (3) notify affected parties per policy and law, (4) remediate — close the gap that allowed it, (5) document and revisit policy. Speed and transparency beat coverup every time.
First hour matters most. Stop the bleeding:
Calmly determine the scope:
Different incidents trigger different notification obligations:
Close the specific gap:
Per your contracts and applicable law. When in doubt, err toward notification — late notification is worse than over-notification.
Whoever owns security or operations. Title doesn't matter; clarity of ownership does.
Sometimes. Review your policy. Specialized AI-error coverage exists but is not yet mainstream.
Honest mistakes — no, retrain. Willful policy violations — yes, follow your standard process.
One-page policy, enterprise-tier tools provisioned widely, clear data classes, regular training, and (most important) clear escalation path for 'is this OK to put in AI?' questions.