Start trial
Crisis Communications

Author, sign off, and export crisis comms with receipts.

23 attorney-shape templates spanning holding statements, customer breach letters, regulator notifications, public statements, internal updates, and board briefs. Privilege chain. Hash-chained signoffs. Watermarked sample exports. You author. You send from your own domain. IR-OS never touches delivery.

Card required, cancel anytime before day 7 · 30-day money-back guarantee

Four pillars

Each pillar is what is missing in a Slack-thread + Confluence + email crisis comms workflow today.

Authoring, not delivery

23 templates across 6 jurisdictions

Holding, breach letters, SEC 8-K, GDPR Art 33, HIPAA HHS, NY DFS, state AG, board briefs. Each cited to its rule.

Privilege chain

Legal, Comms, Executive signoffs all hash-chained

Every signoff captures sha256 of the exact wording approved. Privileged drafts marked structurally.

Defensible exports

PDF + DOCX with full provenance

Sample templates carry a SAMPLE watermark. Clone + edit drops the watermark. Every export logged on chain.

Send from your own domain

IR-OS never delivers external comms

Your DKIM. Your recipient list. We hand you the document. You and counsel decide who gets it.

What a SAMPLE export looks like

When you use a system template directly, the exported PDF and DOCX carry a diagonal SAMPLE watermark on every page. The watermark is a deliberate friction signal: it nudges you to clone the template into your own library, edit it with your facts and counsel review, and only then export a clean version for filing or sending.

Once cloned and edited, the watermark drops. The disclaimer footer remains on every export, regardless. The export itself is logged on the incident hash chain - you can hand a regulator both the document and the /verify URL that proves the document was approved at a specific time by specific named signers.

See the full disclaimer →

SAMPLE
SEC Form 8-K Item 1.05 · Material Cybersecurity Incidents

Item 1.05 Material Cybersecurity Incidents

On {{detection_date}}, {{company_name}} (the "Company") detected a cybersecurity incident affecting {{affected_systems}}.

Based on the information available as of the date of this filing, the Company has determined that this incident is reasonably likely to materially affect, or has materially affected, the Company.

✓ Legal signoff · D. Park, GC · 14:02
✓ CISO signoff · M. Lynd · 14:08
✓ CEO signoff · R. Patel · 14:14
sha256: e7a2b4c8d1f3…

All 23 templates, by category

Each template includes merge fields, citation to the source rule, and notes on jurisdictional variants. Templates are reference materials only - have qualified counsel review every external communication before it is sent or filed.

Holding statements (6)

First-pass acknowledgments when scope is unknown. Internal and external variants.

TemplateAudienceCitationUse when
Generic cyber incident - internalInternalNIST SP 800-61 Rev. 2Security event declared, scope unknown
Ransomware - externalExternalCISA IR PlaybookConfirmed or suspected ransomware
Suspected data breach - externalExternalNIST SP 800-61 Rev. 2Active investigation, exposure possible
Third-party / supply chain - externalExternalCISA SCRM GuidanceVendor compromise being assessed
BEC / wire fraud - internalInternalFBI IC3 BEC GuidanceConfirmed business email compromise
OT / ICS event - internalInternalCISA ICS-CERTIndustrial control / OT environment hit

Customer breach letters (5)

Notification letters to affected individuals. Counsel adapts for state-specific language.

TemplateJurisdictionCitationUse when
US state breach notification - generalCA / NY / MACal. Civ. Code 1798.82Multi-state breach affecting US residents
GDPR Article 34 - high riskEUGDPR Article 34Personal data breach with high risk to subjects
HIPAA Breach NotificationUS Healthcare45 CFR 164.404Unsecured PHI breach affecting individuals
NY DFS Part 500 - individual noticeNY Financial23 NYCRR Part 500Cybersecurity Event affecting nonpublic info
PCI DSS - cardholder notificationPayment cardsPCI DSS v4.0; PFI programPayment card data may be compromised

Public notifications (4)

TemplateChannelLengthUse when
Status page bannerStatus page~50 wordsTop-of-page notice during active incident
Press statement - initialPress~150 wordsFirst-day media-facing statement
Social media postX / LinkedIn~30 wordsAcknowledgment + link to full statement
Customer email - massEmail~200 wordsPlain-text body for customer mass mail

Regulator notifications (4)

TemplateAuthorityCitationDeadline
SEC Form 8-K Item 1.05SEC17 CFR 229.1064 business days from materiality
GDPR Article 33 - DPA noticeEU DPAGDPR Article 3372 hours from awareness
HIPAA HHS - 500+ individualsHHS OCR45 CFR 164.40860 days from discovery
State AG - CaliforniaCA AGCal. Civ. Code 1798.82(f)500+ CA residents affected

Internal & board (4)

TemplateAudiencePrivilegeUse when
Employee all-hands briefEmployeesStandardDay-of detection, contain rumor
Board emergency briefBoardAttorney-clientFirst 24 hours, 2-min readability
Executive talking points (Q&A)SpokespersonAttorney-client work productBriefing CEO before any external comm
Privileged legal updateGC + IR coreAttorney-client work productCounsel update on legal status + clocks

Why we never deliver

Every other crisis comms tool pushes toward integrated delivery. They want to send the email, post to your status page, push the SMS. We deliberately do not. Three reasons:

  1. DKIM and reputation belong to the subscriber. A regulatory notification email failing SPF/DKIM/DMARC because it was sent from a third-party domain is its own incident.
  2. The recipient list is a legal decision. Who exactly receives a customer breach notification, in what order, with what attachment, is a decision for the subscriber and outside counsel - not a feature in a platform.
  3. IR-OS staying out of the delivery chain keeps it out of the disclosure record. If we never send the email, we cannot be subpoenaed for what we sent, when, to whom. Less platform risk; cleaner subscriber control.
What we do instead: we hand you a defensible PDF or DOCX, log the export on the hash chain with a sha256 of the exact bytes, and let you cut/paste, copy, or attach from your own machine. The chain proves what was authored and approved. The send is yours.

The disclaimer is real and enforced

Every user, on first visit to the Crisis Communications surface in IR-OS, must accept the template disclaimer (sha256 of the text plus version is recorded with their acceptance). The disclaimer is restated as a banner on every page in the surface. The disclaimer footer rides along on every PDF and DOCX export, on every page, regardless of whether the SAMPLE watermark applies. The full text is at app.ir-os.com/legal/crisis-comms-disclaimer.

Plain language: these templates are reference materials. They are not legal advice. Have qualified counsel review every external communication before it is sent or filed. We disclaim all warranties. We are not liable for damages arising from your use of these templates.

Run a real draft against your own incident in 7 days.

Start the trial. Pick a template. Clone it. Edit it. Run it through the privilege chain. Export the PDF. Hand the verify URL to your GC and ask if it looks defensible. We think you will be able to answer that question in under an hour.

Start 7-day trial

Card required, cancel anytime before day 7 · 30-day money-back guarantee