|
How was the information exposed, lost, stolen, or accessed? Include the identity of the source of the Cybersecurity Event, if known.
|
|
|
How was the Cybersecurity Event discovered?
|
|
|
What actions are being taken to recover lost, stolen or improperly accessed information?
|
|
|
If the licensee's own business data was involved, please provide details about the type(s) of data involved
|
|
|