Introduction to Our Plan - Top Flite Financial

1. How the loss occurred . 2. Data elements breached . 3. Ability to access the data - the likelihood the personal information will be or has been compromised – made accessible to and usable by unauthorized persons . 4. Ability to mitigate the risk of harm . 5. Evidence of data being used for identity theft or other harm . 1. How Loss Occurred ................
................