Together we can make a difference
Thank you for your valuable contribution
{{ dat.Summary }}
{{ dat.SummaryArabic }}
{{ values.Summary }}
{{ values.SummaryArabic }}
Recognize and assess any safety breach, unauthorized access, or security concern.
Enter details such as date, location, incident type, and key observations.
Submit the completed report to the designated authority or digital platform.
Security team reviews the report, investigates, and initiates appropriate actions.
Once verified, actions are taken, and the report is closed with a resolution note.
Stay informed with current investigations. Each card highlights case scope, leads, and real-time progress.