Back to Insights
AI Incident Response & MonitoringFrameworkPractitioner

AI Incident Communication: Who to Tell and What to Say

January 18, 202612 min readMichael Lansdowne Hauge
For:Communications DirectorsCrisis ManagersPR Leaders

Frameworks for AI incident communication covering stakeholder notification, message templates, and crisis messaging for internal teams, regulators, and customers.

Tech Code Review - ai incident response & monitoring insights

Key Takeaways

  • 1.Different stakeholders need different messages—employees, customers, regulators, media
  • 2.Speed matters but accuracy matters more—verify before communicating
  • 3.Pre-drafted templates accelerate response without sacrificing quality
  • 4.Internal communication should precede or coincide with external disclosure
  • 5.Document all communications for regulatory and legal purposes

When an AI system fails—generating harmful content, making biased decisions, leaking data, or producing dangerous errors—the clock starts ticking. Poor communication during incidents transforms technical problems into reputational crises, regulatory scrutiny, and legal exposure.

This guide provides IT/Security leads and communications professionals with frameworks for AI incident communication: who needs to know, when, and what to say.


Executive Summary

  • AI incidents require different communication than traditional IT incidents due to novel risks, heightened stakeholder concern, and evolving regulatory expectations
  • Six stakeholder groups need tailored communication: internal technical, internal leadership, employees, regulators, customers, and media/public
  • Timing matters—both speed and sequence—some notifications are time-sensitive by regulation; others should be carefully staged
  • Message calibration is critical: technical accuracy, appropriate concern, and actionable guidance without panic or dismissiveness
  • Prepared templates accelerate response while ensuring consistent, appropriate messaging across audiences
  • Post-incident communication is as important as crisis communication—learning and improvement messages rebuild trust
  • Documentation requirements vary by jurisdiction—Singapore, Malaysia, and Thailand have different notification frameworks

Why This Matters Now

AI incident communication has unique challenges:

Novel threat perception. AI failures trigger concerns about uncontrollable technology. Messages must address this anxiety while remaining factually accurate.

Regulatory scrutiny. Data protection authorities in Singapore (PDPC), Malaysia (PDPA), and Thailand (PDPA) have notification requirements. AI-specific governance expectations are emerging.

Media amplification. AI incidents attract disproportionate media attention. A chatbot producing inappropriate content makes headlines when a database error wouldn't.

Stakeholder complexity. Employees, customers, investors, regulators, and the public have different concerns and require different messages from the same incident.


Definitions and Scope

AI incident: An unplanned event involving an AI system that causes or has potential to cause harm, including: erroneous outputs affecting decisions, biased results, privacy breaches, security compromises, system failures, or harmful content generation.

Severity levels:

LevelDescriptionExample
CriticalActive harm, regulatory breach, widespread impactData breach via AI, dangerous misinformation
HighSignificant impact, potential regulatory concernBiased hiring decisions discovered
MediumLimited impact, contained scopeAI producing inappropriate content (caught before external exposure)
LowMinor issues, no external impactPerformance degradation, incorrect non-critical outputs

Stakeholders covered:

  • Internal technical teams
  • Internal leadership (executives, board)
  • Employees
  • Regulators and authorities
  • Customers and partners
  • Media and public

SOP Outline: AI Incident Communication Protocol

Stage 1: Initial Assessment (First 30 Minutes)

Step 1: Confirm incident details

  • What happened? (specific AI system, type of failure)
  • When? (timeline of events)
  • Impact scope? (users affected, data involved, decisions made)
  • Current status? (ongoing, contained, resolved)

Step 2: Assign communication lead

  • Single point for coordinating messages
  • Typically: Communications/PR + Legal + IT Security
  • Authority to approve stakeholder messages

Step 3: Establish facts from speculation

  • Document what you know for certain
  • Identify what's still under investigation
  • Flag what you cannot yet disclose

Stage 2: Internal Technical Notification (First Hour)

Recipients: Incident response team, AI system owners, IT security, relevant technical leads

Purpose: Enable technical response, coordinate investigation

Content:

  • Incident description and timeline
  • Affected systems and scope
  • Current containment status
  • Investigation priorities
  • Resource needs
  • Next briefing time

Channel: Internal incident management system, secure messaging

Stage 3: Leadership Notification (First 2-4 Hours)

Recipients: CEO, relevant C-suite, legal counsel, board (if Critical severity)

Purpose: Enable leadership decisions, prepare for external communication

Content:

  • Executive summary of incident
  • Business impact (known and potential)
  • Regulatory/legal implications
  • Communication plan and timeline
  • Resource requirements
  • Decision points requiring leadership input

Message Template (Leadership):

SUBJECT: AI Incident Alert - [Severity Level] - [System Name]

Summary: [One sentence description of what happened]

Timeline: 
- [When detected]
- [When contained/current status]

Impact:
- Users affected: [number/scope]
- Data involved: [type, sensitivity]
- Business operations: [impact description]

Regulatory considerations:
- [Notification requirements triggered, if any]
- [Timeline for required notifications]

Next steps:
- [Immediate actions underway]
- [Decisions needed from leadership]
- [Communication plan]

Next briefing: [time]
Contact: [Incident lead name and contact]

Stage 4: Regulatory Notification (As Required by Law)

Timing requirements:

JurisdictionRequirementTimeline
Singapore (PDPC)Notifiable data breach3 days (assessment) + notification
Malaysia (PDPA)Data breach notification"As soon as practicable"
Thailand (PDPA)Personal data breach72 hours to authority

Content for regulators:

  • Factual description of incident
  • Scope of impact (individuals, data types)
  • Timeline of detection and response
  • Containment and remediation measures
  • Preventive measures planned
  • Contact for follow-up

Tone: Factual, complete, cooperative. Avoid defensiveness or minimization.

Stage 5: Employee Communication (Within 24 Hours for Significant Incidents)

Recipients: All employees, or relevant departments

Purpose: Prevent rumors, align messaging, provide guidance

Content:

  • What happened (appropriate level of detail)
  • What we're doing about it
  • What employees should do (or not do)
  • How to respond to external inquiries
  • Who to contact with questions

Message Template (Employee):

SUBJECT: Important Update - [Brief Description]

Team,

We want to share an important update about [AI system name/description].

What happened:
[Clear, non-technical explanation of the incident]

What we're doing:
- [Containment actions taken]
- [Investigation underway]
- [Improvements planned]

What this means for you:
- [Any changes to your work/access]
- [Guidance if contacted by external parties]

If you receive any external inquiries, please direct them to [Communications team contact].

We'll provide updates as our investigation progresses. Questions can be directed to [contact].

[Signature]

Stage 6: Customer/Partner Communication (As Appropriate)

Timing: After internal alignment, before media exposure where possible

Recipients: Affected customers, key partners, relevant stakeholders

Purpose: Maintain trust, provide actionable information, demonstrate responsibility

Content:

  • Clear description of incident (not overly technical)
  • What data or services were affected
  • What actions customers should take (if any)
  • What we're doing to address it
  • How we're preventing recurrence
  • Contact for questions

Message Template (Customer):

SUBJECT: Important Notice from [Company] - [Brief Description]

Dear [Customer],

We're writing to inform you about an incident involving [brief description] that may affect you.

What happened:
On [date], we discovered [clear description]. This affected [scope of impact].

What this means for you:
[Specific impact on this customer]
[Any actions they should take]

What we're doing:
- [Immediate actions taken]
- [Ongoing remediation]
- [Future prevention measures]

We take this matter seriously and are committed to [maintaining trust/protecting your data/etc.].

For questions, please contact [dedicated contact/support line].

[Signature]

Tone: Direct, accountable, action-oriented. Avoid corporate jargon and excessive apologies.

Stage 7: Media/Public Communication (If Necessary)

Timing: After regulatory notification (if required), with coordinated messaging

Decision criteria for public statement:

  • Incident is or will become public knowledge
  • Regulatory requirement to disclose
  • Significant public interest
  • Proactive disclosure builds more trust than reactive

Content:

  • Brief factual summary
  • Acknowledgment of impact
  • Actions taken and planned
  • Commitment to affected parties
  • Media contact for follow-up

Key messages:

  • What we know (facts)
  • What we don't yet know (acknowledging uncertainty)
  • What we're doing (actions)
  • What this means for affected parties
  • Our commitment going forward

Stage 8: Post-Incident Communication

Internal post-mortem communication:

  • Root cause findings
  • Lessons learned
  • Process/system changes implemented
  • Thank you to response team

External follow-up (for significant incidents):

  • Investigation completion summary
  • Long-term improvements made
  • Ongoing commitment to stakeholders

Common Failure Modes

Communication lag. Waiting for complete information before saying anything. Stakeholders prefer "we're investigating" to silence.

Inconsistent messages. Different stakeholders receiving contradictory information. Centralize message approval.

Technical jargon. Non-technical stakeholders don't understand and assume the worst. Translate to plain language.

Excessive apology without action. "We're deeply sorry" without "here's what we're doing" feels empty. Lead with actions.

Minimization. Downplaying incidents that later prove serious damages credibility permanently. Be appropriately concerned.

Panic messaging. Alarming stakeholders beyond the actual impact causes unnecessary concern and may trigger regulatory escalation.


Checklist: AI Incident Communication

□ Incident severity classified
□ Facts documented and separated from speculation
□ Communication lead assigned
□ Leadership notified within defined timeline
□ Regulatory requirements assessed
□ Required regulatory notifications prepared/sent
□ Employee communication drafted and approved
□ Customer communication drafted (if applicable)
□ Media holding statement prepared
□ Spokesperson identified and briefed
□ Contact channels established for inquiries
□ Message approval process functioning
□ Communication log maintained
□ Updates scheduled at regular intervals
□ Post-incident communication planned
□ Lessons learned captured for future response

Metrics to Track

Response timeliness:

  • Time from detection to leadership notification
  • Time to regulatory notification (vs. requirement)
  • Time to customer notification (if applicable)

Communication quality:

  • Message consistency across channels
  • Inquiry response time
  • Stakeholder feedback/sentiment

Process effectiveness:

  • Incidents requiring communication escalation
  • Communication protocol compliance rate

Tooling Suggestions

Incident management:

  • Incident tracking platforms
  • Communication coordination tools (Slack/Teams channels)
  • Document collaboration for message drafting

Notification:

  • Mass notification systems (employee alerts)
  • Customer communication platforms
  • Regulatory filing portals

Monitoring:

  • Media monitoring services
  • Social listening tools

Frequently Asked Questions

Q: Should we communicate before we know everything? A: Yes. Early communication acknowledging the situation and promising updates is better than silence. Update as you learn more.

Q: Who approves external communications? A: Typically: Communications + Legal + Incident Owner. For critical incidents: CEO/C-suite approval. Pre-define this in your incident response plan.

Q: What if media contacts us before we're ready? A: Have a holding statement: "We're aware of [description] and are actively investigating. We'll provide updates as we learn more." Don't say "no comment."

Q: How much detail should we share? A: Enough for stakeholders to understand impact and take necessary actions. Avoid technical details that cause confusion. Don't share details that aid attackers.

Q: Should we disclose incidents that weren't public? A: Depends on severity and regulatory requirements. For minor incidents with no external impact, internal documentation may suffice. For significant incidents, proactive disclosure often builds more trust.

Q: How do we handle social media response? A: Monitor but don't engage in debates. Direct inquirers to official statements and support channels. Respond to correct factual inaccuracies only.

Q: What about ongoing litigation concerns? A: Legal counsel should review communications for significant incidents. Balance transparency with legal protection. Don't admit liability without legal guidance.


Build Communication Readiness

Effective AI incident communication requires preparation before incidents occur—templates, processes, and trained personnel. Organizations that practice incident communication respond faster and more effectively when real incidents happen.

Book an AI Readiness Audit to assess your incident response capabilities, develop communication templates, and train your team for effective AI incident management.

[Book an AI Readiness Audit →]


References

  1. PDPC Singapore. (2024). Guide to Managing Data Breaches 2.0.
  2. Bank Negara Malaysia. (2023). Risk Management in Technology.
  3. Thailand PDPC. (2024). Personal Data Breach Notification Guidelines.
  4. NIST. (2024). Cybersecurity Framework: Incident Response.
  5. ISO 27001:2022. Information Security Incident Management.

Frequently Asked Questions

Stakeholders vary by incident type: internal teams, affected users, customers, regulators, media, and partners. Map communication needs to incident severity and type.

Explain what happened, who is affected, what you're doing about it, and what recipients should do. Be honest about what you know and don't know.

Brief internal teams first or simultaneously with external disclosure. Ensure consistent messaging, provide talking points for customer-facing staff, and document all communications.

References

  1. PDPC Singapore. (2024). Guide to Managing Data Breaches 2.0.. PDPC Singapore Guide to Managing Data Breaches (2024)
  2. Bank Negara Malaysia. (2023). Risk Management in Technology.. Bank Negara Malaysia Risk Management in Technology (2023)
  3. Thailand PDPC. (2024). Personal Data Breach Notification Guidelines.. Thailand PDPC Personal Data Breach Notification Guidelines (2024)
  4. NIST. (2024). Cybersecurity Framework: Incident Response.. NIST Cybersecurity Framework Incident Response (2024)
  5. ISO 27001:2022. Information Security Incident Management.. ISO Information Security Incident Management (2022)
Michael Lansdowne Hauge

Founder & Managing Partner

Founder & Managing Partner at Pertama Partners. Founder of Pertama Group.

ai incidentscrisis communicationincident responsestakeholder managementsecurityrisk managementAI incident communication templatescrisis communication AI incidentsstakeholder notification AI breachAI incident messaging frameworkincident response communications

Ready to Apply These Insights to Your Organization?

Book a complimentary AI Readiness Audit to identify opportunities specific to your context.

Book an AI Readiness Audit