Edsthetic policy

Incident response plan

How Edsthetic detects, responds to, contains, and recovers from security incidents affecting school, staff, or student data. Aligned with the Notifiable Data Breaches scheme (Part IIIC of the Privacy Act 1988).

Effective date19 April 2026
Review cycleAnnual — next April 2027
OwnerAshwin Pillai, Co-founder
Contacthello@edsthetic.com.au
← Back to Security

1. Purpose

This plan sets out how Edsthetic detects, responds to, contains, and recovers from security incidents affecting school, staff, or student data held in Writeiq and Allocateiq. It supports Edsthetic's obligations to schools under the Data Processing Agreement and to the Office of the Australian Information Commissioner (OAIC) under the Notifiable Data Breaches scheme (Part IIIC of the Privacy Act 1988).

2. Scope

A security incident is any event that compromises, or could compromise, the confidentiality, integrity, or availability of school data. This includes:

3. Severity classification

SeverityDefinitionExamples
P1 — CriticalConfirmed breach of student data, or complete service outageUnauthorised export of submission data; production database deleted
P2 — HighCredential compromise, suspected breach, or single-school outageService key rotated under suspicion; one school unable to log in for over 30 minutes
P3 — MediumVulnerability without confirmed exploitation, or degraded serviceCSP bypass found in staging; rate limit exhaustion causing slow marking
P4 — LowInformational, researcher disclosure, or contained anomalySecurity researcher reports non-exploitable finding; one teacher reports unusual but benign behaviour

4. Response team

For Edsthetic's current size, the response team is:

As Edsthetic grows, the team expands to dedicated Incident, Technical, and Communications leads.

5. Detection

Edsthetic monitors the following channels for incident indicators:

All Edsthetic staff and school coordinators are encouraged to report anything unusual immediately to hello@edsthetic.com.au. No concern is too small.

6. Response workflow

6.1 Acknowledge (within 2 hours of detection)

6.2 Contain (within 4 hours of P1/P2 incidents)

Containment is always the first priority. Specific actions depend on the incident class:

6.3 Investigate (begin within 4 hours, complete within 7 days for P1/P2)

6.4 Notify

Notification requirements depend on severity and legal obligation.

Affected schools:

Office of the Australian Information Commissioner (OAIC):

Other subprocessors and regulators:

6.5 Remediate

6.6 Post-incident review (within 14 days of resolution for P1/P2)

7. Communications

During an active incident, Edsthetic communicates with schools through:

Edsthetic does not disclose incident details on social media, through teacher/student-facing channels, or in public forums until schools have been individually notified and a coordinated public statement is agreed.

8. Backup and recovery

Recovery depends on the nature of the incident:

9. Records

Edsthetic maintains an incident register including:

The register is retained for six years. Schools may request incident reports relating to their own data at any time within that window.

10. Testing

11. Contact

General: hello@edsthetic.com.au

Security-specific: hello@edsthetic.com.au with "Security" in the subject line

Responsible disclosure: researchers finding vulnerabilities may email hello@edsthetic.com.au and will receive acknowledgement within two business days. We commit to not pursuing legal action against good-faith researchers who disclose responsibly and give us a reasonable window to fix before public disclosure.

12. Review

This plan is reviewed annually by the Edsthetic co-founders. Material changes are communicated to schools by email at least 30 days before they take effect.


Related documents: Security & Privacy · Data Deletion Policy · Staff Security Training · Data Processing Agreement (PDF)