ဝန္ဒာမိ

If you accept guardianship of a sacred object, you accept a duty of truthful record-keeping about its fate.

Total Pageviews

ဝန္ဒာမိ

Namo Buddhassa. Namo Dhammassa. Namo Sanghassa. Namo Matapitussa. Namo Acariyassa.

ဝန္ဒာမိ စေတိယံ

ဝန္ဒာမိ စေတိယံ သဗ္ဗံ၊ သဗ္ဗဋ္ဌာနေသု ပတိဋ္ဌိတံ။ ယေ စ ဒန္တာ အတီတာ စ၊ ယေ စ ဒန္တာ အနာဂတာ၊ ပစ္စုပ္ပန္နာ စ ယေ ဒန္တာ၊ သဗ္ဗေ ဝန္ဒာမိ တေ အဟံ။

Tuesday, December 23, 2025

TK-030 Template Title: Sensitive Info Leaked in Process (C/G) — Access Mapping + Data Handling Rule

 

THE HSWAGATA BUDDHA TOOTH RELIC PRESERVATION PRIVATE MUSEUM

FOR INTERNAL USE ONLY

Template No.: TK-030

Template Title: Sensitive Info Leaked in Process (C/G) — Access Mapping + Data Handling Rule

Related Research Case IDs / Cluster:
Cluster C (Institution-Building & Records Discipline) / Cluster G (Neglect risk, weak controls, loss through poor handling)

Linked Templates / Policies:

  • TK-023 Verbal-to-written confirmation SOP (if leak was via calls)

  • TK-029 Evidence Package Template (if evidence was overshared)

  • T31 Chain-of-Custody Log (for sensitive items)

  • Institutional Policies for Relic Stewardship (Safeguarding & Integrity)

Date of form: ____ / ____ / ______

Prepared by / Role: _______________________

Office / Unit: ____________________________

Country / Location: _______________________

Confidentiality Level:
☑ Internal only ☐ Restricted ☐ Sacred-Restricted / Sensitive

Use of this form (tick):
☐ New case / action ☑ Follow-up ☐ Annual review ☐ Archive only


TK-030 — SENSITIVE INFO LEAKED IN PROCESS (C/G)

(Who accessed + data handling rule)


1. Purpose

Use TK-030 when sensitive information is leaked during an administrative process, such as:

  • names, phone numbers, addresses,

  • relic location, storage method,

  • donor identities and amounts,

  • internal conflict details,

  • draft letters, evidence packages, screenshots.

This template helps HSWAGATA to:

  • map who accessed the info,

  • stop further spread,

  • correct weak handling,

  • set a clear “data handling rule” for next actions.


2. Quick Classification

Tick one:

  • C-type: accidental leak by poor admin process (email forwarding, wrong CC, casual talk).

  • G-type: leak linked to neglect/weak controls (no access limits, no logs, unmanaged copies).

If threats, pressure, or extortion appear, move to conflict pathway (F).


3. Immediate Containment (Do Now)

  1. ☐ Stop sending more files until scope is known.

  2. ☐ Freeze the “latest package” version (no edits).

  3. ☐ Save evidence of leak (screenshots, emails, forwarded headers).

  4. ☐ Change access permissions (remove shared links, change passwords if used).

  5. ☐ Inform only the minimum internal leaders (need-to-know).


4. “Who Accessed” Mapping Form

A. What Was Leaked?

Tick all that apply:

  • ☐ Personal data (name/phone/address/ID)

  • ☐ Relic location / security details

  • ☐ Donor data (names/amounts)

  • ☐ Photos of relics / storage

  • ☐ Legal/complaint content

  • ☐ Evidence package documents

  • ☐ Other: ______________________

B. Where Did the Leak Happen?

  • ☐ Email (wrong recipient / CC / forward)

  • ☐ Messaging app (Line/WhatsApp/Viber/etc.)

  • ☐ Printed copies (left behind)

  • ☐ Shared drive / link

  • ☐ Meeting talk / verbal

  • ☐ External office handling

  • ☐ Unknown

C. Known or Possible Viewers (List)

Fill as a list. Use “Known” vs “Possible”.

Known viewers:

  1. __________________ (role/office)



Possible viewers:

  1. __________________ (how could they access?)



D. Access Timeline

  • First date/time leaked: //____ ______

  • Last confirmed access: //____ ______

  • Is the link/file still accessible? ☐ Yes ☐ No ☐ Unknown

E. Evidence of Leak (Attach)

  • ☐ Email header / forwarding chain

  • ☐ Screenshot of shared message

  • ☐ Link audit / access list (if available)

  • ☐ Witness note (who saw what)


5. Impact Check (Simple)

Tick what impact is possible:

  • ☐ Privacy harm to people

  • ☐ Increased theft/security risk

  • ☐ Rumour/misinformation risk

  • ☐ Damage to trust with donors/community

  • ☐ Institutional reputation risk

  • ☐ Legal/regulatory risk

Risk level now: ☐ Low ☐ Medium ☐ High


6. Response Options (Choose What Fits)

Option A — Internal Correction Only (Low/Medium)

  • ☐ Notify internal team: “Do not resend. Use new rules.”

  • ☐ Replace file with redacted version for external use.

  • ☐ Update access permissions and logs.

Option B — External Containment Request (Medium/High)

Send a short, calm request to the office/person who received it:

Respectfully submitted,
We learned that a file/message may contain sensitive internal information.
For safety and privacy, we kindly request:

  1. Please do not forward or share it, and

  2. Please delete any extra copies if not required for official procedure.
    If you need the materials, we can provide a redacted version.
    With respect, …

Option C — Security Upgrade (High)

  • ☐ Move sensitive files to restricted storage

  • ☐ Two-person approval before sending

  • ☐ New code names for relic locations (internal only)

  • ☐ Review access list weekly for 30 days


7. DATA HANDLING RULE (HSWAGATA Minimum Standard)

Rule 1 — “Need-to-Know Only”

Share sensitive data only with:

  • the responsible office/unit, and

  • the named officer (if possible).

No broad distribution.

Rule 2 — “Copies First”

Send copies by default.
Originals only by in-person showing + receipt.

Rule 3 — “Redaction Default”

Before sending externally, remove:

  • personal phone numbers,

  • home addresses,

  • ID numbers,

  • exact relic storage location,
    unless it is strictly required.

Rule 4 — “One Package, One Owner”

Each evidence package must have:

  • one package code (TK030-…),

  • one sender,

  • one approved version.

No parallel versions.

Rule 5 — “No Open Links”

Do not use open public links.
If a link is required, use:

  • expiry date,

  • password,

  • access list.

Rule 6 — “Two-Person Review”

Any sensitive outgoing package must be reviewed by:

  • preparer + second reviewer.

Rule 7 — “Access Log”

Keep a simple log:

  • who had access,

  • when it was sent,

  • what version.

Rule 8 — “Speak Carefully”

Do not discuss sensitive details in public areas or casual chat.
Use short, procedural language only.

This reduces neglect-type loss and strengthens governance discipline.


8. Corrective Action Record (Fill-in)

Actions taken today:

  • ☐ Link removed / access closed

  • ☐ Redacted package prepared

  • ☐ External containment request sent

  • ☐ Internal instruction issued

  • ☐ Password changed / permissions updated

  • ☐ Other: ______________________

Responsible person: ______________________
Next review date: ____ / ____ / ______


9. Archive Checklist

Attach and file:

  • ☐ “Who accessed” mapping (Section 4)

  • ☐ Leak evidence (screenshots, headers)

  • ☐ Containment messages sent

  • ☐ New data handling rule acknowledgment (internal)

  • ☐ Updated access log

Archive tag: TK-030 / Sensitive info leak (C/G)


End of Template TK-030

သာဓိကာရ ပဋိဝေဒနာ

သာဓိကာရ ပဋိဝေဒနာ © ၂၀၂၁ ဘိက္ခု ဓမ္မသမိ (ဣန္ဒသောမ) သိရိဒန္တမဟာပါလက-ကာယာလယ. သဗ္ဗေ အဓိကာရာ ရက္ခိတာ. ဣဒံ သာသနံ တဿ အတ္ထဉ္စ အာယသ္မတော ဓမ္မသာမိဿ ဉာဏသမ္ပတ္တိ ဟောန္တိ၊ ယေန ကေနစိ ပုဗ္ဗာနုညာတံ လိခိတ-အနုမတိံ ဝိနာ န ပုန-ပ္ပကာသေတဗ္ဗံ န ဝိတ္ထာရေတဗ္ဗံ ဝါ.

Content Source Declaration

All content published on this website, www.siridantamahapalaka.com, including but not limited to articles, Dharma talks, research findings, and educational resources, is intended solely for the purpose of Dhamma dissemination, study, and public benefit. Some images and visual content used throughout this website are sourced from public domains, Google searches, and social media platforms. These are used in good faith for non-commercial and educational purposes. If any copyright holder has concerns regarding the usage of their content, please feel free to contact us for proper acknowledgment or removal. A portion of the Dharma talks, especially those categorized under "Dharma Talk" and "Dependent Origination – Questions and Answers", have been translated from the teachings of respected Venerable Sayadaws. Proper reverence is maintained in delivering these teachings with accuracy and sincerity for the benefit of Dhamma practitioners. We deeply respect the intellectual and spiritual contributions of all teachers and content creators. Our aim is to preserve, promote, and respectfully share the teachings of the Buddha.

©️ Copyright Notice

© 2021 Sao Dhammasami( Siridantamahapalaka) . All rights reserved. This articles and its contents are the intellectual property of Venerable Ashin Dhammasami and may not be reproduced or distributed without prior written permission.

🔸 Disclaimer on Translations and Content Accuracy

While great care has been taken in translating Dhamma talks and related materials, any errors, inaccuracies, or interpretative issues that may be found within this blog are solely the responsibility of the author. This website and its content are not affiliated with or officially represent any individual, group, institution, or monastery/temple or Musuem. All translations, interpretations, and editorial decisions have been made independently by the author with sincere intention for Dhamma sharing. We humbly request the understanding and forgiveness of readers and the venerable teachers, should any shortcomings or misinterpretations arise.