Data Breach

Checklist Data Breach Response

“Target has demonstrated . . . that the work of

 Determine whether breach justifies escalation  Begin documentation of decisions and actions  Engage experienced legal counsel to lead pro-

cess, determine privilege vs disclosure tracks  Notify and convene Incident Response Team  Notify cyber insurance carrier  Engage forensics to mitigate continued harm,

the Data Breach Task Force was focused not on remediation of the breach . . . but on informing Target’s in-house and outside counsel about the breach so that Target’s attorneys could provide the company with legal advice and prepare to defend the company in litigation that was already pending and was reasonably expected to follow.” In re Target Corp. Customer Data Breach Litigation

gather evidence, and investigate  Assess scope and nature of data compromised  Preliminarily determine legal obligations  Determine whether to notify law enforcement  Begin preparing public relations message  Engage notification / credit services vendor  Notify affected business partners

“Firms must adopt written policies to protect their clients’ private information . . . they need to anticipate potential cybersecurity events and have clear procedures in place rather than waiting to react once a breach occurs.” S.E.C. v. R.T. Jones Capital Equities Mgt.

 Investigate whether data has been “breached”  Determine when notification “clock” started  Remediate and protect against future breaches  Confirm notification / remediation obligations

“You don’t drown by falling in the water; you drown by staying there.” -Edwin Louis Cole

 Determine proper remediation services  Obtain contact information for notifications  Prepare notification letters, frequently asked

questions, and call centers  Plan and time notification “drop”  Implement public relations strategy  Administrative reporting (i.e., SEC)  Implement Cybersecurity Risk Management

Program

Cybersecurity Risk Management

For more information, please contact: Shawn E. Tuma Cybersecurity & Data Protection Partner Direct: 214.472.2135 | Mobile: 214.726.2808 [email protected] Blog: www.shawnetuma.com

Program

Scheef & Stone, L.L.P. is a full service business law firm providing clients with litigation, transactional, technology, and intellectual property services with expertise in business cyber risk areas of cybersecurity, data protection, privacy, and computer fraud. ATTORNEY ADVERTISING

© 2016 Scheef & Stone, L.L.P.

www.solidcounsel.com

Data Breach Checklist.pdf

Sign in. Loading… Whoops! There was a problem loading more pages. Retrying... Whoops! There was a problem previewing this document. Retrying.

1MB Sizes 1 Downloads 164 Views

Recommend Documents

Data Breach Charts - BakerHostetler
BakerHostetler's Privacy and Data Protection Team. Our blog is: ... Data Breach Charts. [2]. States in Which Definition for “Personal Information” is Broader than the General Definition. Alaska. Personal Information of Alaska residents. ..... Med

SecurityMetrics PCI Data Breach Visualization.pdf
MEMORY-SCRAPING MALWARE. INSTALLED ON THEIR SYSTEM. 89% OF ORGANIZATIONS HAD. FIREWALLS IN PLACE AT TIME OF. COMPROMISE ...

Efficient Material Breach of Contract
Seller internalizes the costs social costs of the defect and exerts efficient effort. →(IC). Buyer reaps expected gross surplus; .... and can collect (imperfect) compensation: BA(δ) = v − α(δ) − p. - Material breach if δ>µ. Buyer can rejec

Practical New Developments on BREACH - GitHub
Our work demonstrates that BREACH can evolve to attack major web applica- tions, confirming ... on extensibility and scalability, resulting in a fairly modular design, allowing for easy .... first corresponds to the top half of the alphabet and the s

Watch Breach Of Promise (1942) Full Movie Online Free ...
Watch Breach Of Promise (1942) Full Movie Online Free .Mp4____________.pdf. Watch Breach Of Promise (1942) Full Movie Online Free .Mp4____________.

Watch Breach (2007) Full Movie Online.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Watch Breach (2007) Full Movie Online.pdf. Watch Breach (2007) Full Movie Online.pdf. Open. Extract. Open wi

pdf-1462\breach-of-faith-american-churches-and-the-immigration ...
Try one of the apps below to open or edit this item. pdf-1462\breach-of-faith-american-churches-and-the-immigration-crisis-by-james-c-russell.pdf.

Watch His Breach of Promise (1920) Full Movie Online Free ...
Watch His Breach of Promise (1920) Full Movie Online Free .MP4________.pdf. Watch His Breach of Promise (1920) Full Movie Online Free .MP4________.pdf.

why do we not see more efficient breach at the WTO?
lobbying for protection, and thus acts to slow down trade liberalization. It is little ..... (1952), 'Summary record of the Seventh Meeting', SR. 7/7. Goldstein, J. L., D.

why do we not see more efficient breach at the WTO?
All remaining errors are my own. I gratefully ... proposals have been floated by Members that would facilitate efficient breach in the way suggested by its ...

pdf-1552\a-breach-of-promise-a-sudden-fearful ...
... apps below to open or edit this item. pdf-1552\a-breach-of-promise-a-sudden-fearful-death-t ... lf-3-paperbacks-william-monk-novels-by-anne-perry.pdf.

Data! Data! Data! PD Powerpoint.pdf
... below to open or edit this item. Data! Data! Data! PD Powerpoint.pdf. Data! Data! Data! PD Powerpoint.pdf. Open. Extract. Open with. Sign In. Main menu.

data
Required to publish source code. Open ... 4TB compressed, split into daily tarballs. 97TB (! ... http://code.google.com/apis/bigquery/docs/dataset-mlab.html.

Data Warehouse and Data Mining Technology Data ...
IJRIT International Journal of Research in Information Technology, Vol. 1, Issue 2, February ... impact, relevance and need in Enterpr relevance and ... The data that is used in current business domains is not accurate, complete and precise.