CapGRC
Back to resources
Law 25Article

Security Incident Management Under Law 25: Obligations and Best Practices

Since September 2023, all Quebec organizations must notify privacy incidents. Here is a complete guide to structuring your incident response process and meeting your legal obligations.

10 min readMarch 5, 2026

A ransomware attack hits your organization at 3 AM. Customer data has been exfiltrated. You now have a few hours to decide whether to notify the Commission d’accès à l’information du Québec (CAI) and affected individuals. Without a pre-established plan, this decision becomes a legal and operational nightmare. Law 25 leaves no room for improvisation.

Penalties for non-compliance

Failure to comply with incident notification obligations can result in administrative fines of up to 25 million dollars or 4% of worldwide turnover. The CAI may also publish decisions, creating a major reputational risk.

What is a privacy incident under Law 25?

Law 25 defines a privacy incident as any unauthorized access, use or disclosure of personal information, or loss of control over it. This includes cyberattacks, internal leaks, accidental disclosures and loss of physical media.

Types of incidents covered

  • Cyberattacks (ransomware, data exfiltration, phishing)
  • Unauthorized access by an employee or third party
  • Accidental data disclosure to the wrong person
  • Loss or theft of a device containing personal information
  • Accidental or unauthorized destruction of data
  • Compromise of a third-party vendor with access to your data

The 6-step incident response process

1

Detection and internal reporting

Immediate
  • The employee who discovers the incident immediately reports it to their manager
  • The manager notifies the PRPI (Person Responsible for Personal Information Protection)
  • The incident is recorded in the incident register with a timestamp
  • A response team is activated if the incident is significant
2

Containment and initial assessment

0–24 hours
  • Isolate compromised systems to limit propagation
  • Preserve digital evidence (logs, memory captures)
  • Conduct a preliminary assessment of the nature and scope of the incident
  • Determine whether personal information is involved
3

Risk of harm assessment

24–48 hours
  • Identify the categories and number of individuals affected
  • Assess the sensitivity of exposed data (health, finances, biometrics, etc.)
  • Determine whether a serious risk of harm is present
  • Document the analysis with the criteria evaluated
4

Notification to the CAI

As soon as possible
  • Complete the CAI incident declaration form
  • Submit the form via the CAI online portal
  • Include: nature of the incident, data involved, measures taken
  • Keep a copy of the declaration with a timestamp
5

Notification to affected individuals

Without undue delay
  • Identify the contact information of individuals whose data was compromised
  • Draft a clear notice: nature of the incident, data involved, measures taken and recommendations
  • Send the notice by the means most likely to reach the individuals
  • Retain proof of notifications sent
6

Remediation and recording

Post-incident
  • Implement corrective measures to prevent recurrence
  • Document the complete incident in the incident register
  • Conduct a post-incident review (lessons learned)
  • Update policies and procedures if necessary

The incident register: a legal obligation

Every organization must maintain a register of all privacy incidents, even those that do not present a serious risk of harm. This register must be kept for at least 5 years and made available to the CAI upon request.

  • Date and time the incident was discovered
  • Nature of the incident and known causes
  • Categories and approximate number of individuals affected
  • Categories of personal information involved
  • Measures taken to reduce the risk of harm
  • Indication of whether the CAI and individuals were notified (with dates)

CapGRC automates your Law 25 incident management

Integrated incident register, guided risk-of-harm assessment and automatic generation of CAI declaration forms.