Mechanisms exist to formally assign personnel or roles with responsibility for responding to sensitive/regulated data spills.
Does the organization formally assign personnel or roles with responsibility for responding to sensitive/regulated data spills?