The Complete Playbook for Handling Cybersecurity Incidents, Data Breaches & Compliance Emergencies
When the breach happens, you won’t have time to figure out what to do. This template tells you exactly how to respond—minute by minute, hour by hour.
HOW TO USE THIS TEMPLATE
Before an incident:
- Customize all sections with your business information
- Fill in contact information for your team
- Print physical copies (digital may be inaccessible during incident)
- Store copies in multiple locations (office, home, cloud)
- Review and update quarterly
- Conduct tabletop exercises annually
During an incident:
- Open this template immediately
- Follow the phase-by-phase instructions
- Use the checklists to ensure nothing is missed
- Document everything in the Incident Log
- Communicate using the pre-written templates
This template covers:
- Ransomware attacks
- Data breaches
- POS system compromises
- Metrc/compliance system failures
- Insider threats
- Physical security incidents with cyber components
SECTION 1: INCIDENT RESPONSE TEAM
1.1 Internal Team Contacts
Complete this section NOW, before any incident occurs.
Role Primary Contact Phone Email Backup Contact Phone
Incident Commander
IT Lead
Operations Lead
Compliance Officer
Communications Lead
Legal Counsel
Owner/Executive
1.2 External Contacts
Resource Company/Name Phone Email Account #
IT Support/MSP
Cybersecurity Firm
Cyber Insurance
Policy #:
Legal Counsel
PR/Communications
POS Vendor Support
Metrc Support (877) 566-6506 support@metrc.com
License #:
BioTrack Support
License #:
1.3 Regulatory Contacts
Agency Contact Info When to Contact
State Cannabis Regulator
Name:
Phone:
Email:
State Attorney General
Data breach notification
Phone:
Website:
FBI Cyber Division ic3.gov Major cybercrime
Local Field Office:
Local Police
Physical security component
Non-emergency:
1.4 Role Definitions
Incident Commander (IC)
- Overall authority during incident
- Makes final decisions on response actions
- Coordinates between all teams
- Authorizes communications and notifications
- Typically: Owner, GM, or designated senior manager
IT Lead
- Technical investigation and containment
- System isolation and recovery
- Evidence preservation
- Coordinates with external IT/security vendors
- Typically: IT manager, MSP primary contact
Operations Lead
- Maintains business continuity
- Manages staff during incident
- Coordinates manual workarounds
- Ensures customer service continues
- Typically: Store manager, operations director
Compliance Officer
- Regulatory notification requirements
- Documentation for auditors
- Metrc/BioTrack communication
- State regulator liaison
- Typically: Compliance manager, license holder
Communications Lead
- Internal staff communications
- Customer notifications
- Media inquiries
- Social media monitoring
- Typically: Marketing manager, owner
Legal Counsel
- Legal notification requirements
- Liability assessment
- Law enforcement coordination
- Contract review (insurance, vendors)
- Typically: Outside attorney
SECTION 2: INCIDENT CLASSIFICATION
2.1 Severity Levels
Level Name Definition Response Time Example
1 CRITICAL Business operations halted, customer data compromised, regulatory violation imminent Immediate (within 15 min) Ransomware encrypting systems, active data exfiltration, Metrc completely down
2 HIGH Significant impact to operations, potential data exposure, compliance risk Within 1 hour POS system compromised, suspected breach, Metrc sync failure >4 hours
3 MEDIUM Limited operational impact, no confirmed data exposure Within 4 hours Phishing email clicked, malware detected and contained, single workstation compromised
4 LOW Minimal impact, no data exposure, easily remediated Within 24 hours Failed login attempts, spam/phishing emails (not clicked), minor policy violation
2.2 Incident Types
Check the type(s) that apply:
☐ Ransomware Attack
- Systems encrypted
- Ransom demand received
- Business operations impacted
☐ Data Breach
- Customer data accessed/stolen
- Employee data accessed/stolen
- Business data accessed/stolen
☐ POS Compromise
- Payment system affected
- Transaction data exposed
- Customer ID data exposed
☐ Malware Infection
- Virus/trojan detected
- Spyware identified
- Cryptominer found
☐ Phishing/Social Engineering
- Employee clicked malicious link
- Credentials compromised
- Wire fraud attempted
☐ Insider Threat
- Employee data theft
- Unauthorized access
- Sabotage
☐ Compliance System Failure
- Metrc down/inaccessible
- BioTrack sync failure
- Inventory discrepancy discovered
☐ Denial of Service
- Website/systems unavailable
- Network overwhelmed
- Online ordering down
☐ Physical Security with Cyber Component
- Stolen devices (laptop, tablet, phone)
- Break-in with system access
- Unauthorized facility access
☐ Vendor/Third-Party Incident
- POS vendor breached
- Cloud provider incident
- Payment processor compromised
SECTION 3: INCIDENT RESPONSE PHASES
PHASE 1: DETECTION & INITIAL RESPONSE
Timeline: 0-60 minutes
Immediate Actions (First 15 Minutes)
☐ STOP. BREATHE. DON’T PANIC.
Hasty actions can destroy evidence or make things worse.
☐ Document the discovery
- What was observed?
- Who discovered it?
- What time?
- What systems are affected?
☐ Do NOT:
- Turn off systems (unless actively spreading)
- Delete files or logs
- Attempt to “fix” things without documentation
- Communicate externally (yet)
- Pay any ransom (yet)
☐ Notify Incident Commander
Call: ______________________
If unavailable, call backup: ______________________
☐ Incident Commander activates response team
Initial Assessment (15-60 Minutes)
Incident Commander Actions:
☐ Convene response team (in-person or emergency call)
Conference bridge: ______________________ Backup: ______________________
☐ Gather initial information:
Question Answer
What systems are affected?
Is the incident ongoing or contained?
Is customer data potentially exposed?
Can we still operate the business?
Is Metrc/compliance affected?
What is the business impact?
☐ Classify severity level: ☐ 1-Critical ☐ 2-High ☐ 3-Medium ☐ 4-Low
☐ Classify incident type(s): (from Section 2.2)
☐ Assign roles:
- IT Lead: ______________________
- Operations Lead: ______________________
- Compliance Officer: ______________________
- Communications Lead: ______________________
☐ Establish communication channel:
- Primary: ______________________
- Backup (if primary compromised): ______________________
⚠️ DO NOT use company email if email system may be compromised. Use personal phones, Signal, or out-of-band communication.
☐ Begin Incident Log (Section 7)
PHASE 2: CONTAINMENT
Timeline: 1-4 hours
Goal: Stop the bleeding. Prevent further damage.
Network Containment
☐ Isolate affected systems
System Action Taken Time By
☐ Disconnected from network
☐ Disconnected from network
☐ Disconnected from network
Methods of isolation:
- Unplug network cable (preferred - preserves system state)
- Disable WiFi
- Disable network port on switch
- Block at firewall
⚠️ DO NOT power off unless malware is actively spreading and you cannot isolate otherwise. Powering off destroys volatile memory evidence.
☐ Block attacker access points
Action Completed Time
Change compromised passwords ☐
Revoke compromised API keys ☐
Block malicious IP addresses at firewall ☐
Disable compromised user accounts ☐
Change WiFi passwords ☐
Revoke VPN access for affected users ☐
☐ Preserve evidence
Evidence Type Location Preserved? Method
System logs
☐
Firewall logs
☐
POS transaction logs
☐
Security camera footage
☐
Email headers/messages
☐
Malware samples
☐
Screenshots
☐
Evidence preservation methods:
- Screenshot everything
- Export logs to external storage
- Create forensic disk images (if capable)
- Document chain of custody
Operational Containment
☐ Implement manual operations (if systems down)
Function Manual Workaround Responsible
Sales transactions Paper receipts, manual inventory
ID verification Visual check, paper log
Metrc reporting Manual tracking, report when restored
Customer check-in Paper sign-in
Inventory management Physical count, spreadsheet
☐ Notify staff of situation
Use template: [Staff Notification - Initial] (Section 6.1)
What to tell staff:
- We are experiencing a technical issue
- Follow these temporary procedures
- Do not discuss with customers unless asked
- Direct all questions to [designated person]
- Do not post on social media
What NOT to tell staff (yet):
- Specific details of the attack
- Whether customer data was stolen
- Ransom amounts or demands
- Anything that could leak externally
Vendor Notification
☐ Notify critical vendors
Vendor Contact Notified? Time Notes
POS Vendor
☐
IT Support/MSP
☐
Cybersecurity Firm
☐
Cyber Insurance
☐
Payment Processor
☐
Cyber Insurance - Critical: Most policies require notification within 24-72 hours. Check your policy.
Policy #: ______________________ Claims phone: ______________________ Notification deadline: ______________________
PHASE 3: ERADICATION
Timeline: 4-48 hours
Goal: Remove the threat completely.
Investigation
☐ Determine root cause
Question Finding
How did attacker gain access?
When did the attack begin?
What systems were accessed?
What data was accessed/stolen?
Is the attacker still present?
Were any backdoors installed?
Common attack vectors to investigate:
- Phishing email (check email logs)
- Compromised credentials (check login logs)
- Unpatched vulnerability (check patch status)
- Third-party vendor (check vendor access logs)
- Insider threat (check employee access)
- Physical access (check camera footage)
☐ Engage forensics (if needed)
For Severity 1-2 incidents, consider professional forensics:
Forensics firm: ______________________ Contact: ______________________ Retainer in place? ☐ Yes ☐ No
☐ Document attack timeline
Time Event Evidence Source
Removal
☐ Remove malware/threats
System Threat Found Removal Method Verified Clean?
☐
☐
☐
Removal methods:
- Antivirus/EDR quarantine and removal
- Manual deletion (document file paths)
- System wipe and rebuild (most thorough)
☐ Patch exploited vulnerabilities
Vulnerability Patch/Fix Applied? Verified?
☐ ☐
☐ ☐
☐ ☐
☐ Reset all potentially compromised credentials
Account Type Reset? MFA Enabled?
Domain admin accounts ☐ ☐
POS admin accounts ☐ ☐
Metrc/BioTrack accounts ☐ ☐
Email accounts ☐ ☐
Cloud service accounts ☐ ☐
VPN accounts ☐ ☐
WiFi passwords ☐ ☐
API keys ☐ ☐
☐ Verify systems are clean before reconnecting
System Scanned? Clean? Approved to Reconnect?
☐ ☐ ☐
☐ ☐ ☐
☐ ☐ ☐
PHASE 4: RECOVERY
Timeline: 24-72 hours
Goal: Restore normal operations safely.
System Restoration
☐ Restore from clean backups (if needed)
System Backup Date Restore Started Restore Completed Verified?
☐
☐
☐
⚠️ Verify backups are clean before restoring. Attackers sometimes compromise backups too.
☐ Rebuild compromised systems (if needed)
System Rebuild Started Rebuild Completed Configured? Tested?
☐ ☐
☐ ☐
☐ Reconnect systems to network
System Reconnected Time Monitoring Enabled?
☐
☐
☐
☐
☐
☐
Compliance Restoration
☐ Restore Metrc/BioTrack connectivity
Task Completed Time
Test Metrc API connection ☐
Verify sync is working ☐
Reconcile any missed transactions ☐
Document any inventory discrepancies ☐
Report discrepancies to regulator (if required) ☐
☐ Reconcile inventory
Task Completed Discrepancy?
Physical inventory count ☐ ☐ Yes ☐ No
Compare to Metrc records ☐ ☐ Yes ☐ No
Compare to POS records ☐ ☐ Yes ☐ No
Document and resolve discrepancies ☐
☐ Catch up on missed compliance reporting
Report Due Date Submitted Notes
☐
☐
Verification & Monitoring
☐ Implement enhanced monitoring
Monitoring Type Enabled? Duration
Increased log review ☐ 30 days minimum
Failed login alerts ☐ Permanent
Unusual traffic alerts ☐ 30 days minimum
File integrity monitoring ☐ Permanent
Endpoint detection alerts ☐ Permanent
☐ Verify no signs of re-infection for 48-72 hours
Check Day 1 Day 2 Day 3
No malware alerts ☐ ☐ ☐
No unusual network traffic ☐ ☐ ☐
No unauthorized access attempts ☐ ☐ ☐
All systems operating normally ☐ ☐ ☐
PHASE 5: NOTIFICATION
Timeline: Per regulatory requirements (typically 24-72 hours for breach)
Goal: Meet all legal notification requirements.
Notification Decision Tree
Was customer data accessed or stolen?
│
├── YES → Data Breach Notification Required
│ │
│ ├── How many customers affected?
│ │ ├── 500+ in single state → Media notification may be required
│ │ └── Any number → Individual notification required
│ │
│ ├── Was medical data involved?
│ │ ├── YES → HIPAA notification rules may apply
│ │ └── NO → State breach notification law applies
│ │
│ └── Continue to notification checklist below
│
├── NO, but could have been → Document investigation showing no access
│ │
│ └── Consider voluntary notification if customers may be at risk
│
└── NO, confirmed no data access → No breach notification required
│
└── Still notify: Insurance, regulator (if operations affected), vendors
Regulatory Notification Checklist
☐ State Cannabis Regulator
Item Details
Regulator name
Notification deadline
Contact method ☐ Phone ☐ Email ☐ Portal
Contact info
Notification sent ☐ Date:
Confirmation received ☐
Use template: [Regulator Notification] (Section 6.3)
☐ State Attorney General (if data breach)
Item Details
Notification deadline
Website/portal
Notification sent ☐ Date:
Confirmation received ☐
☐ Law Enforcement (if criminal activity)
Item Details
Agency contacted
Report number
Investigating officer
Contact info
Customer Notification Checklist
☐ Determine notification requirements
State Customers Affected Notification Deadline Method Required
☐ Prepare notification letter
Use template: [Customer Breach Notification] (Section 6.4)
☐ Set up support resources
Resource Details
Dedicated phone line
Email address
FAQ page URL
Credit monitoring vendor
Enrollment code
☐ Send notifications
Method Quantity Sent Date Confirmation
☐
☐
Website posting
☐
Other Notifications
☐ Cyber insurance claim filed
Item Details
Policy number
Claim number
Adjuster name
Contact info
☐ Credit bureaus notified (if SSN exposed)
Bureau Notified Date
Equifax ☐
Experian ☐
TransUnion ☐
☐ Payment card brands notified (if card data exposed)
Brand Notified Date
Visa ☐
Mastercard ☐
Other ☐
PHASE 6: POST-INCIDENT
Timeline: 1-4 weeks after incident
Goal: Learn from the incident and prevent recurrence.
Post-Incident Review Meeting
☐ Schedule post-incident review
Date: ______________________ Attendees: ______________________
Agenda:
- Incident timeline review
- What worked well
- What didn’t work
- Root cause analysis
- Gaps identified
- Remediation actions
- Template/process updates
☐ Document lessons learned
Category Finding Action Required
Detection
Containment
Communication
Recovery
Notification
Remediation Actions
☐ Security improvements
Improvement Priority Owner Due Date Completed
☐
☐
☐
☐
☐ Process improvements
Improvement Priority Owner Due Date Completed
☐
☐
☐ Training needs
Training Audience Due Date Completed
☐
☐
Documentation Finalization
☐ Complete incident report
Use template: [Final Incident Report] (Section 6.6)
☐ Archive all documentation
Document Location Retention Period
Incident log
7 years
Forensic report
7 years
Notification records
7 years
Insurance claim docs
7 years
Remediation evidence
7 years
☐ Update incident response template based on lessons learned
SECTION 4: SPECIFIC INCIDENT PLAYBOOKS
4.1 Ransomware Playbook
You see a ransom note. Systems are encrypted. What now?
Immediate (0-15 minutes)
☐ DO NOT pay the ransom immediately ☐ DO NOT turn off systems (evidence) ☐ DO NOT delete the ransom note
☐ Take photos of:
- Ransom note on screen
- Any error messages
- Affected systems
☐ Disconnect affected systems from network
- Unplug ethernet cables
- Disable WiFi
- Leave systems powered on
☐ Notify Incident Commander
First Hour
☐ Identify scope of encryption
System Type Encrypted? Backup Available?
POS terminals ☐ ☐
POS server ☐ ☐
Workstations ☐ ☐
File server ☐ ☐
Security cameras ☐ ☐
Other: ☐ ☐
☐ Identify ransomware variant
- Check ransom note for clues
- Search file extensions on nomoreransom.org
- Engage cybersecurity firm for identification
Ransomware variant: ______________________
☐ Check for free decryptor
- nomoreransom.org
- Vendor security blogs
- Cybersecurity firm resources
Free decryptor available? ☐ Yes ☐ No
☐ Notify cyber insurance IMMEDIATELY
Many policies cover ransomware response costs, including:
- Forensics
- Negotiation specialists
- Ransom payment (controversial but sometimes covered)
- Business interruption
Hours 1-4
☐ Assess backup integrity
Backup Date Accessible? Verified Clean?
☐ ☐
☐ ☐
⚠️ Attackers often delete or encrypt backups. Verify backups are accessible and uncompromised before relying on them.
☐ Implement manual operations
Function Manual Process Owner
Sales Paper receipts
Inventory Manual tracking
Compliance Phone to regulator
☐ Decide on ransom payment
Factors to consider:
- Is decryptor available for free?
- Are backups available and clean?
- How long to restore from backups?
- What is ransom amount vs. business interruption cost?
- Does insurance cover ransom payment?
- What are legal implications?
⚠️ FBI recommends NOT paying ransoms as it funds criminal operations and doesn’t guarantee data recovery. However, this is a business decision.
☐ If paying ransom (decision of last resort):
- Engage professional negotiators (insurance may provide)
- Verify attackers can decrypt (request proof)
- Negotiate price (often reduced 50-70%)
- Use cryptocurrency exchange recommended by insurance
- Document everything for insurance claim
☐ If NOT paying ransom:
- Proceed to restoration from backups
- Engage forensics to ensure complete removal
- Report to FBI (ic3.gov)
Recovery
☐ Wipe and rebuild affected systems
For ransomware, rebuilding is safer than attempting to “clean” systems.
☐ Restore data from clean backups
☐ Implement additional security controls before reconnecting
Control Implemented?
MFA on all accounts ☐
All passwords changed ☐
Endpoint detection installed ☐
Backups verified and secured ☐
Patches applied ☐
4.2 Data Breach Playbook
Customer data has been accessed or stolen. What now?
Immediate (0-15 minutes)
☐ Confirm the breach
- How was it discovered?
- What evidence exists?
- Is it ongoing or contained?
☐ Preserve evidence
- Do not delete logs
- Screenshot everything
- Export relevant logs immediately
☐ Notify Incident Commander
First Hour
☐ Determine scope of breach
Data Type Affected?
Records
Evidence
Customer names ☐
Addresses ☐
Dates of birth ☐
Driver’s licenses ☐
Passport numbers ☐
Medical cannabis cards ☐
Purchase histories ☐
Payment card data ☐
Social Security numbers ☐
Email addresses ☐
Phone numbers ☐
Employee data ☐
☐ Determine source of breach
Possibility Investigated Finding
External hacker ☐
Phishing attack ☐
Insider threat ☐
Vendor compromise ☐
Accidental exposure ☐
☐ Notify cyber insurance
Claim #: ______________________
Hours 1-24
☐ Engage forensics
For any breach involving customer data, professional forensics is strongly recommended.
Forensics firm: ______________________ Engagement started: ______________________
☐ Determine notification requirements
Jurisdiction
Customers
Notification Deadline Specific Requirements
☐ Prepare customer notification
See Section 6.4 for template.
☐ Arrange credit monitoring services
Most breaches involving SSN, financial data, or government IDs require offering credit monitoring.
Vendor Contact Cost per Person
Customer Notification (Per Timeline)
☐ Notification methods:
Method When to Use Completed
Email All affected with email on file ☐
Physical mail Required in most states ☐
Website notice Supplement, not replacement ☐
Media notice If 500+ affected in single state (some states) ☐
☐ Notification content requirements:
Most state laws require:
- Description of incident
- Types of data exposed
- Steps you’re taking
- Steps customer can take
- Contact information for questions
- Information about free credit monitoring (if offered)
4.3 Metrc/Compliance System Failure Playbook
Metrc is down, sync is failing, or inventory doesn’t match. What now?
Immediate
☐ Identify the issue:
Issue Type Symptoms
☐ Metrc system-wide outage Can’t log in, status.metrc.com shows issues
☐ API sync failure POS not syncing, API errors
☐ Credential issue Authentication errors
☐ Inventory discrepancy POS vs Metrc mismatch
☐ Our systems down Can’t access our own systems
☐ Check Metrc status page: https://status.metrc.com
System status: ☐ Operational ☐ Degraded ☐ Outage
If Metrc System-Wide Outage
☐ Document the outage
- Screenshot Metrc status page
- Note start time
- Note what functions are affected
☐ Implement manual tracking
Transaction Type Manual Process
Sales Paper receipt with package UID, quantity, time
Inventory adjustments Paper log with reason
Waste disposal Video + paper log + witness
Transfers Hold until Metrc restored
☐ Notify state regulator if outage extends beyond 4 hours
Phone: ______________________ Email: ______________________
☐ When Metrc restores:
- Enter all manual transactions
- Verify inventory matches
- Document resolution
If API Sync Failure (Our Side)
☐ Check our systems:
- Is POS operational?
- Is internet connection working?
- Can we log into Metrc directly?
☐ Check API credentials:
- Are credentials valid?
- Have they expired?
- Have they been rotated?
☐ Contact POS vendor support:
Ticket #: ______________________
☐ If not resolved within 1 hour:
- Switch to manual Metrc entry
- Document all transactions
- Notify state regulator if extending beyond 4 hours
If Inventory Discrepancy Discovered
☐ Determine scope:
Item POS Qty Metrc Qty Difference
Total discrepancy: ______ units / ______ grams
☐ Investigate cause:
Possible Cause Investigated Finding
Data entry error ☐
Sync failure ☐
Theft ☐
Unreported waste ☐
Receiving error ☐
☐ Conduct physical inventory count
Count performed by: ______________________ Date/time: ______________________ Result: ______________________
☐ If discrepancy > acceptable variance (typically ±2% or 6 units):
Notify state regulator within 24 hours
State Notification Requirement
California Report to DCC
Colorado Report to MED
Michigan Report to CRA
[Your state]
☐ Document resolution:
- Adjust Metrc with reason code
- Adjust POS to match
- File any required reports
- Retain documentation for 3+ years
4.4 Insider Threat Playbook
You suspect an employee is stealing data, stealing product, or sabotaging systems.
Immediate
⚠️ Handle carefully. Legal and HR implications are significant.
☐ Do NOT confront the employee
☐ Do NOT discuss with other employees
☐ Notify:
- Owner/executive
- Legal counsel
- HR (if applicable)
☐ Document your suspicions:
- What behavior was observed?
- When?
- By whom?
- What evidence exists?
Investigation
☐ Engage legal counsel BEFORE taking action
Employment law varies by state. Improper investigation can result in lawsuits.
☐ Preserve evidence discreetly:
Evidence Type Collected? Method
Access logs ☐
Email records ☐
File access logs ☐
Security camera footage ☐
Badge access records ☐
Metrc user activity ☐
Witness statements ☐
☐ Review employee access:
- What systems do they have access to?
- What data can they access?
- What have they accessed recently?
☐ Consider engaging professional investigator
For significant theft or data exfiltration, professional investigators can:
- Conduct forensic analysis
- Interview witnesses
- Preserve evidence for legal proceedings
Containment (Once Investigation Supports Action)
☐ With legal/HR approval, restrict access:
Action Completed Time
Disable network account ☐
Disable Metrc access ☐
Disable POS access ☐
Disable badge access ☐
Change shared passwords ☐
Revoke API keys they knew ☐
☐ Retrieve company property:
- Laptop
- Phone
- Keys
- Badge
- Documents
☐ Termination (with HR/legal guidance)
Post-Incident
☐ Determine if data was exfiltrated:
- Were customer records copied?
- Was proprietary information taken?
- Was inventory stolen?
☐ If customer data was stolen:
- Treat as data breach
- Follow Data Breach Playbook (4.2)
- Customer notification may be required
☐ Consider law enforcement report:
- Consult with legal counsel
- File police report if criminal theft
- Preserve evidence for prosecution
☐ Review access controls to prevent recurrence
SECTION 5: MANUAL OPERATIONS PROCEDURES
When systems are down, use these procedures to continue business.
5.1 Manual Sales Procedure
Use when POS system is unavailable.
Supplies Needed: ☐ Paper receipt books (pre-numbered) ☐ Calculator ☐ Price list (current) ☐ Manual inventory log ☐ Customer ID log sheet ☐ Cash box with starting drawer
Procedure:
Verify customer age
- Check government ID Record on Customer ID Log:
- Receipt #
- Customer initials
- ID type
- DOB
- ID expiration
- Verified by (employee initials)
Record sale on paper receipt
- Date and time
- Receipt number
- Product name(s)
- Package UID(s) - CRITICAL for Metrc reconciliation
- Quantity
- Price per unit
- Total
- Payment method
- Employee initials
Update manual inventory log
- Deduct sold items
- Record Package UID
- Note receipt number
Process payment
-
Cash: Make change, place in cash box
-
Debit (if terminal working): Process normally
-
Provide customer copy of receipt When POS restored:
-
Enter ALL manual transactions
-
Reconcile with Metrc
-
Verify inventory counts
-
File paper records (retain 3+ years)
5.2 Manual Metrc Tracking Procedure
Use when API sync is down but Metrc web interface is accessible.
Procedure:
- Log into Metrc directly: https://[state].metrc.com For each sale:
- Go to Packages → Active
- Find Package UID
- Record sale manually
- Note: This is time-consuming; prioritize accuracy over speed
For inventory adjustments:
- Document on paper with reason
- Enter into Metrc when accessible
- Retain paper documentation
For waste disposal:
- DO NOT dispose without documentation
- Video record the disposal
- Have witness sign paper log
- Enter into Metrc when accessible
For transfers:
- DO NOT complete transfers without Metrc
- Hold product until system restored
- If urgent, contact state regulator for guidance
5.3 Manual Inventory Count Procedure
Use for reconciliation during/after incidents.
Supplies Needed: ☐ Inventory count sheets ☐ Barcode scanner (if available) ☐ Calculator ☐ Two-person teams (counter + recorder)
Procedure:
- Stop all sales during count (or count after close)
- Assign zones to teams Count procedure:
- Counter: Physically count items
- Recorder: Write down Package UID and count
- Use tally marks for accuracy
- Double-count any discrepancies
Record:
- Package UID
- Product name
- Physical count
- Location
Compare to Metrc:
-
Export Metrc active packages
-
Compare physical count to Metrc count
-
Note all discrepancies
-
Investigate discrepancies before adjusting
SECTION 6: COMMUNICATION TEMPLATES
6.1 Staff Notification - Initial Incident
[INTERNAL USE ONLY - DO NOT SHARE]
To: All Staff
From: [Incident Commander]
Date: [Date]
Re: Technical Issue - Action Required
Team,
We are currently experiencing a technical issue affecting [describe affected systems in general terms].
IMMEDIATE ACTIONS:
1. [Specific instruction, e.g., "Do not use the POS system"]
2. [Specific instruction, e.g., "Use paper receipts for all transactions"]
3. [Specific instruction, e.g., "Direct all customer questions to the manager on duty"]
WHAT TO TELL CUSTOMERS:
"We're experiencing some technical difficulties. We can still serve you, but transactions may take a bit longer. We apologize for any inconvenience."
WHAT NOT TO DO:
- Do not discuss details of the issue with customers
- Do not post anything on social media
- Do not share information with anyone outside the company
- Do not speculate about what happened
We are working to resolve this as quickly as possible. Updates will follow.
If you have questions, please see [designated manager].
Thank you for your patience and professionalism.
[Name]
[Title]
6.2 Staff Notification - All Clear
To: All Staff
From: [Incident Commander]
Date: [Date]
Re: Technical Issue - RESOLVED
Team,
The technical issue reported on [date] has been resolved. Normal operations have resumed.
ACTIONS:
1. Resume normal procedures
2. [Any specific follow-up actions]
If you notice anything unusual with systems, please report immediately to [contact].
Thank you for your patience during this time.
[Name]
[Title]
6.3 Regulator Notification
To: [State Cannabis Regulatory Agency]
From: [License Holder Name]
License Number: [Number]
Date: [Date]
Re: Security Incident Notification
Dear [Regulator Contact],
In accordance with [state regulation reference], we are notifying you of a security incident affecting our licensed cannabis operation.
INCIDENT SUMMARY:
- Date/time discovered: [Date/Time]
- Type of incident: [Brief description]
- Systems affected: [List systems]
- Current status: [Contained/Under investigation/Resolved]
IMPACT ON OPERATIONS:
- [Describe operational impact]
- [Describe compliance impact, if any]
- [Describe any Metrc/tracking issues]
ACTIONS TAKEN:
1. [Action]
2. [Action]
3. [Action]
CUSTOMER DATA:
- Customer data affected: [Yes/No/Under investigation]
- If yes, types of data: [List]
- If yes, number of customers: [Number or estimate]
We are committed to full transparency and compliance throughout this incident. We will provide updates as our investigation progresses.
Please contact me directly with any questions.
Respectfully,
[Name]
[Title]
[Phone]
[Email]
6.4 Customer Breach Notification Letter
[COMPANY LETTERHEAD]
[Date]
[Customer Name]
[Address]
[City, State ZIP]
Re: Notice of Data Security Incident
Dear [Customer Name],
We are writing to inform you of a security incident that may have affected your personal information.
WHAT HAPPENED:
On [date], we discovered that [brief, factual description of incident]. We immediately [actions taken - e.g., "launched an investigation, engaged cybersecurity experts, and notified law enforcement"].
WHAT INFORMATION WAS INVOLVED:
Based on our investigation, the following types of your information may have been affected:
- [List specific data types, e.g., "Name, address, date of birth"]
- [E.g., "Driver's license number"]
- [E.g., "Transaction history with our dispensary"]
WHAT WE ARE DOING:
We take the security of your information seriously. In response to this incident, we have:
- [Action, e.g., "Engaged leading cybersecurity experts to investigate"]
- [Action, e.g., "Implemented additional security measures"]
- [Action, e.g., "Notified law enforcement"]
- [Action, e.g., "Notified state regulators"]
WHAT YOU CAN DO:
We recommend you take the following steps to protect yourself:
1. Monitor your financial accounts for any unauthorized activity
2. Review your credit reports for any accounts you did not open
3. Consider placing a fraud alert or credit freeze on your credit file
4. Be cautious of unsolicited communications asking for personal information
FREE CREDIT MONITORING:
We are offering you [12/24] months of complimentary credit monitoring and identity protection services through [Vendor Name]. To enroll, please visit [Website] and use enrollment code [CODE] by [Deadline Date].
FOR MORE INFORMATION:
If you have questions, please contact us at:
- Phone: [Dedicated line]
- Email: [Dedicated email]
- Website: [FAQ page URL]
We sincerely apologize for any inconvenience or concern this incident may cause. We are committed to protecting your information and maintaining your trust.
Sincerely,
[Name]
[Title]
[Company Name]
6.5 Media Statement
[COMPANY NAME] STATEMENT REGARDING SECURITY INCIDENT
[City, State] - [Date]
[Company Name] recently became aware of a security incident that may have affected some customer information.
Upon discovering the incident, we immediately took steps to secure our systems and launched a comprehensive investigation with the assistance of leading cybersecurity experts. We have also notified law enforcement and are cooperating fully with their investigation.
We are in the process of notifying potentially affected customers directly and are offering complimentary credit monitoring services.
The security of our customers' information is a top priority. We are taking additional steps to enhance our security measures and prevent similar incidents in the future.
We apologize for any concern this may cause our customers.
For more information, customers may contact [phone number] or visit [website].
###
Media Contact:
[Name]
[Email]
[Phone]
6.6 Final Incident Report Template
INCIDENT REPORT
[CONFIDENTIAL]
Report Date: [Date]
Incident ID: [Unique ID]
Report Author: [Name]
Report Status: ☐ Draft ☐ Final
═══════════════════════════════════════════════════════════
EXECUTIVE SUMMARY
[2-3 paragraph summary of incident, impact, and resolution]
═══════════════════════════════════════════════════════════
INCIDENT DETAILS
Classification:
- Severity Level: [1-4]
- Incident Type: [Type]
- Status: [Detected/Contained/Eradicated/Recovered/Closed]
Timeline:
- First indication: [Date/Time]
- Incident discovered: [Date/Time]
- Incident commander notified: [Date/Time]
- Containment achieved: [Date/Time]
- Eradication completed: [Date/Time]
- Recovery completed: [Date/Time]
- Incident closed: [Date/Time]
Duration:
- Time from first indication to discovery: [Duration]
- Time from discovery to containment: [Duration]
- Total incident duration: [Duration]
═══════════════════════════════════════════════════════════
SYSTEMS AFFECTED
[List all affected systems]
DATA AFFECTED
[Describe data affected, if any]
- Customer data: [Yes/No, if yes, describe]
- Employee data: [Yes/No, if yes, describe]
- Business data: [Yes/No, if yes, describe]
- Records affected: [Number]
═══════════════════════════════════════════════════════════
ROOT CAUSE ANALYSIS
Attack Vector:
[How attacker gained access]
Vulnerabilities Exploited:
[What weaknesses were exploited]
Contributing Factors:
[What enabled the incident]
═══════════════════════════════════════════════════════════
RESPONSE SUMMARY
Detection:
[How incident was detected]
Containment Actions:
[What was done to contain]
Eradication Actions:
[What was done to remove threat]
Recovery Actions:
[What was done to restore operations]
═══════════════════════════════════════════════════════════
NOTIFICATIONS
| Entity | Date Notified | Method | Response |
|--------|---------------|--------|----------|
| | | | |
| | | | |
═══════════════════════════════════════════════════════════
BUSINESS IMPACT
Operational Impact:
[Describe operational disruption]
Financial Impact:
- Direct costs: $[Amount]
- Indirect costs: $[Amount]
- Estimated total: $[Amount]
Reputational Impact:
[Describe any reputational effects]
Regulatory Impact:
[Describe any regulatory consequences]
═══════════════════════════════════════════════════════════
LESSONS LEARNED
What Worked Well:
1. [Lesson]
2. [Lesson]
What Could Be Improved:
1. [Lesson]
2. [Lesson]
═══════════════════════════════════════════════════════════
REMEDIATION ACTIONS
| Action | Priority | Owner | Due Date | Status |
|--------|----------|-------|----------|--------|
| | | | | |
| | | | | |
═══════════════════════════════════════════════════════════
ATTACHMENTS
☐ Detailed timeline
☐ Forensic report
☐ Notification copies
☐ Evidence inventory
☐ Cost documentation
═══════════════════════════════════════════════════════════
APPROVALS
Prepared by: _________________ Date: _______
Reviewed by: _________________ Date: _______
Approved by: _________________ Date: _______
═══════════════════════════════════════════════════════════
SECTION 7: INCIDENT LOG
Use this log to document ALL actions during an incident. This is your legal record.
Incident Log Sheet
Incident ID: ______________________ Date Started: ______________________ Incident Commander: ______________________
Date Time Action/Event By Whom Notes
Page ___ of ___
SECTION 8: QUICK REFERENCE CARDS
Print these on card stock and keep at each workstation.
Card 1: First Responder Quick Reference
╔═══════════════════════════════════════════════════╗
║ SECURITY INCIDENT? FOLLOW THESE STEPS: ║
╠═══════════════════════════════════════════════════╣
║ ║
║ 1. STOP - Don't panic, don't turn anything off ║
║ ║
║ 2. DOCUMENT - Note what you see ║
║ • What happened? ║
║ • What time? ║
║ • What systems? ║
║ ║
║ 3. CALL - Notify immediately ║
║ Incident Commander: _______________ ║
║ Backup: _______________ ║
║ ║
║ 4. ISOLATE - If instructed, unplug network ║
║ (Leave power ON unless told otherwise) ║
║ ║
║ 5. PRESERVE - Don't delete anything ║
║ ║
║ DO NOT: ║
║ ✗ Turn off computers ║
║ ✗ Delete files or emails ║
║ ✗ Try to "fix" it yourself ║
║ ✗ Tell customers details ║
║ ✗ Post on social media ║
║ ║
╚═══════════════════════════════════════════════════╝
Card 2: Incident Commander Quick Reference
╔═══════════════════════════════════════════════════╗
║ INCIDENT COMMANDER CHECKLIST ║
╠═══════════════════════════════════════════════════╣
║ ║
║ FIRST 15 MINUTES: ║
║ ☐ Assess situation ║
║ ☐ Classify severity (1-4) ║
║ ☐ Activate response team ║
║ ☐ Start incident log ║
║ ║
║ FIRST HOUR: ║
║ ☐ Contain the incident ║
║ ☐ Preserve evidence ║
║ ☐ Notify cyber insurance ║
║ ☐ Implement manual operations if needed ║
║ ║
║ CRITICAL CONTACTS: ║
║ IT Lead: _______________ ║
║ Legal: _______________ ║
║ Insurance: _______________ ║
║ Regulator: _______________ ║
║ ║
║ REMEMBER: ║
║ • Document EVERYTHING ║
║ • Don't make hasty decisions ║
║ • Communicate clearly ║
║ • Ask for help when needed ║
║ ║
╚═══════════════════════════════════════════════════╝
SECTION 9: APPENDICES
Appendix A: State Breach Notification Requirements
State Notification Deadline AG Notification Regulator Notification
California “Most expedient time possible” Required if 500+ DCC required
Colorado 30 days Required if 500+ MED required
Michigan “Without unreasonable delay” Required if 1000+ CRA required
Nevada “As soon as possible” Required CCB required
Illinois “Most expedient time possible” Required if 500+ IDFPR required
Massachusetts “As soon as practicable” Required CCC required
Oregon 45 days Required if 250+ OLCC required
Washington 45 days Required LCB required
[Your State]
Note: Requirements change. Verify current law at time of incident.
Appendix B: Evidence Handling Chain of Custody
Item Description Source Location Date/Time Collected Collected By Storage Location Access Log
Appendix C: Insurance Policy Quick Reference
Policy Type Carrier Policy # Coverage Limit Deductible Claims Phone
Cyber Liability
General Liability
Property
Business Interruption
Notification Requirements:
- Deadline: ______________________
- Method: ______________________
- Required documentation: ______________________
Appendix D: System Recovery Priority
Priority System RTO RPO Recovery Method Owner
1 POS
2 Metrc Integration
3 Security Cameras
4 Employee Workstations
5
RTO = Recovery Time Objective (how quickly must it be restored?) RPO = Recovery Point Objective (how much data loss is acceptable?)
ANNUAL MAINTENANCE CHECKLIST
Review and update this template at least annually:
☐ Update all contact information ☐ Verify insurance policy details ☐ Confirm regulatory contacts are current ☐ Review state notification requirements ☐ Test backup restoration procedures ☐ Conduct tabletop exercise with team ☐ Update based on lessons learned ☐ Distribute updated copies to all locations
Last Review Date: ______________________ Next Review Date: ______________________ Reviewed By: ______________________
CONCLUSION
When an incident happens, you won’t have time to figure out what to do.
This template gives you:
- Clear roles so everyone knows their job
- Step-by-step procedures so nothing is missed
- Pre-written communications so you don’t scramble for words
- Documentation tools so you have legal records
- Quick references so responders can act fast
Print it. Customize it. Practice it.
The difference between a minor incident and a catastrophic breach is often just preparation.
Questions about incident response?
Ask in #incident-response channel in our private Discord
Related Resources:
- The Complete Dispensary Cybersecurity Hardening Guide
- POS Vendor Security Assessment Checklist
- Metrc Security Configuration Guide
- Employee Security Training Materials



