HomeBlogAboutPricingContact๐ŸŒ ไธญๆ–‡
โ† Back to Home่ณ‡่จŠๅฎ‰ๅ…จ
Complete Guide to Cybersecurity Incident Reporting: Process, Deadlines, and FAQ [2025]

Complete Guide to Cybersecurity Incident Reporting: Process, Deadlines, and FAQ [2025]

๐Ÿ“‘ Table of Contents

Complete Guide to Cybersecurity Incident Reporting: Process, Deadlines, and FAQ [2025]Complete Guide to Cybersecurity Incident Reporting: Process, Deadlines, and FAQ [2025]

Complete Guide to Cybersecurity Incident Reporting: Process, Deadlines, and FAQ

A cybersecurity incident has occurred โ€” what should you do?

Beyond technical remediation, there's one more crucial step: reporting.

Taiwan's Cyber Security Management Act mandates that certain organizations must report cybersecurity incidents. Failure to report or late reporting may result in penalties.

This article explains the complete cybersecurity incident reporting process.

After reading, you'll know: when to report, how quickly, how to report, and to whom.


What Is a Cybersecurity Incident?

๐Ÿ’ก Key Takeaway: First, let's define clearly: what constitutes a "cybersecurity incident"?

Definition of a Cybersecurity Incident

According to the Enforcement Rules of the Cyber Security Management Act, a cybersecurity incident is:

A situation where the state of a system, service, or network, upon identification, indicates a possible violation of cybersecurity policies or failure of protective measures, or a previously unknown situation that may be security-related.

In plain language, this means:

Common Types of Cybersecurity Incidents

TypeExamples
MalwareRansomware, viruses, trojans
Intrusion attacksSystem compromise, backdoor implantation
Data breachPersonal data leaks, confidential data theft
Service disruptionDDoS attacks, system crashes
Account abuseAccount hijacking, privilege abuse
Website defacementWebpage replacement, malicious code injection
PhishingSuccessful phishing email attacks

Situations That May Not Require Reporting

The following situations don't necessarily trigger a reporting obligation:

However, if you're unsure, it's better to report. It's better to over-report than to miss one.


Cybersecurity Incident Reporting Obligations

Who needs to report? Under what circumstances?

Reporting Obligors

Under the Cyber Security Management Act, the following are required to report:

Government Agencies

All government agencies must report cybersecurity incidents.

Specific Non-Government Agencies

Designated specific non-government agencies have reporting obligations, including:

Reporting Recipients

Government Agencies

Report to:

  1. Superior agency
  2. Administration for Cyber Security, Ministry of Digital Affairs

Specific Non-Government Agencies

Report to the central competent authority.

For example:

When Is Reporting Required?

Simply put: report when you discover a cybersecurity incident.

But there's a prerequisite: the incident must reach a certain level of impact.

Must report:

Situational:

In practice, it's recommended to follow the "better safe than sorry" principle. When in doubt, report and let the competent authority decide.


Cybersecurity Incident Reporting Deadlines

Reporting has deadlines. Missing them may result in penalties.

Incident Levels and Deadlines

Cybersecurity incidents are classified into four levels, each with different reporting deadlines:

LevelDefinitionPreliminary ReportDetailed Report
Level 4Affects other agencies or the publicWithin 1 hourWithin 8 hours
Level 3Core operations unable to functionWithin 8 hoursWithin 24 hours
Level 2Core operations affected but functionalWithin 24 hoursWithin 72 hours
Level 1Non-core operations affectedWithin 72 hoursWithin 7 days

How to Determine the Level?

Level 4 (Most Severe)

Characteristics:

Examples:

Level 3

Characteristics:

Examples:

Level 2

Characteristics:

Examples:

Level 1

Characteristics:

Examples:

When Does the Deadline Start?

When does the clock start ticking?

Time of Awareness

The deadline starts from the moment you "become aware of the incident."

Awareness = any person in the organization discovers and confirms it as a cybersecurity incident.

For example:

Not the Time of Occurrence

The incident may have occurred two weeks ago, but you only discovered it today. The deadline starts from today.

Consequences of Late Reporting

Administrative Penalties

Failure to report within the prescribed deadline: NT$300,000 to NT$5,000,000.

Penalties may be imposed per violation (each delay counts).

Other Impacts


Cybersecurity Reporting Platform Operations

How do you actually report?

Reporting Channels

Government Agencies

Use the "Government Cybersecurity Incident Reporting Platform" (G-ISAC).

URL: https://gisac.nat.gov.tw

Specific Non-Government Agencies

Use the "National Cybersecurity Information Sharing and Analysis Center" (N-ISAC).

URL: https://www.nisac.nat.gov.tw

Or report through channels designated by the central competent authority.

Reporting Process

Step 1: Log In

Log into the reporting platform with your agency account.

(If you don't have an account, you'll need to apply through the competent authority first.)

Step 2: Create a Report

Fill in the reporting form, including:

Step 3: Submit Preliminary Report

Complete the initial report. The system will assign a case number.

Step 4: Submit Detailed Report

Provide additional details within the required timeframe:

Step 5: Closure Report

After the incident is resolved, submit a closure report:

Key Points for Reporting Content

A good report should include:

Basic Information

Technical Information

Impact Assessment

Handling Status


Cybersecurity Incident Response Process

Reporting is just one part. The complete incident response process is as follows:

Phase 1: Detection and Identification

Discovering Anomalies

Possible discovery sources:

Confirming the Incident

Initial assessment:

Phase 2: Containment

Preventing Spread

Immediate actions:

Preserving Evidence

Don't rush to clean up:

Phase 3: Reporting

Preliminary Report

Complete the initial report within the deadline:

Detailed Report

Supplement with detailed information:

Phase 4: Investigation and Eradication

Investigating the Cause

Find out:

Eradicating the Threat

Phase 5: Recovery

System Recovery

Service Restoration

Phase 6: Review and Improvement

Post-Incident Review

Improvement Measures

Don't know how to handle a cybersecurity incident? Incident response requires professional experience. Contact us urgently โ€” we provide incident response support.


FAQ

I'm not sure if it's a cybersecurity incident. Should I report it?

Yes, it's recommended.

You can first report it as a "suspected cybersecurity incident" and confirm through subsequent investigation.

The risk of missing a report is greater than the risk of a false report.

The incident has already been resolved. Do I still need to report?

Yes.

Your reporting obligation doesn't disappear just because you've resolved the issue.

Moreover, one purpose of reporting is to help the competent authority maintain situational awareness. Even if you've resolved it, the intelligence is still valuable.

Will reporting result in penalties?

Reporting itself won't result in penalties.

The Cyber Security Management Act penalizes:

Proactive reporting is the correct behavior and won't result in penalties.

Can I report anonymously?

Formal reports cannot be anonymous. You need to provide agency and contact information.

However, if you've discovered someone else's security issue, you can submit it anonymously through vulnerability disclosure channels.

Will reporting data be made public?

No, it won't be made public.

Reporting data is confidential, accessible only to the competent authority and relevant agencies.

However, major incidents may be reported by the media (not leaked from the reporting system).

Do small companies need to report?

It depends on whether you've been designated as a "specific non-government agency."

If you haven't been designated, there's no legal mandatory reporting obligation.

However, if personal data is involved in a breach, you may need to report under the Personal Data Protection Act.

What if an incident occurs on a holiday?

Deadlines still apply.

Holidays are not a valid reason to extend reporting deadlines.

It's recommended to plan holiday duty schedules and reporting procedures in advance.

Can I have a vendor help with reporting?

The reporting obligation lies with you and cannot be fully delegated.

However, vendors can assist with:

The final submission of the report must be done by you.

For more information on cybersecurity regulations, see Complete Guide to the Cyber Security Management Act.


Next Steps

Cybersecurity incident reporting is both an obligation and a way to protect yourself.

Pre-Incident Preparation

  1. Confirm your reporting obligations and recipients
  2. Apply for a reporting platform account
  3. Establish internal reporting procedures
  4. Designate responsible persons and deputies
  5. Conduct reporting drills

When an Incident Occurs

  1. Calmly assess the incident level
  2. Complete the preliminary report within the deadline
  3. Simultaneously proceed with technical remediation
  4. Continuously update reporting content
  5. Complete the closure report

Further reading:


Need cybersecurity incident response support?

Every second counts during an incident. Professional support helps you control damage faster.

CloudSwap provides:

Contact us urgently โ€” we'll help you handle cybersecurity incidents.

Need Professional Cloud Advice?

Whether you're evaluating cloud platforms, optimizing existing architecture, or looking for cost-saving solutions, we can help

Book Free Consultation

่ณ‡่จŠๅฎ‰ๅ…จAWSAzure
โ† Previous
Taiwan Cybersecurity Management Act: Regulations, Compliance Requirements, Enterprise Guide [2025]
Next โ†’
What Is a Cybersecurity Health Check? Services, Costs, and Vendor Comparison Guide [2025]