No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
    • Upcoming
    • On-Demand
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights

Data Breach Planning and Preparation

by Christian Auty
February 29, 2016
in Uncategorized
Advance planning is a must for data security

Responding to a data breach is one of the more challenging events any company can face.  On the one hand, a data breach requires nearly instantaneous decision making.  Which servers are affected and should be removed from the network (but not shut off)?  Who should be notified?  Should law enforcement, a regulator or the insurer be contacted first?  When should the breach be made public, if at all?  What experts should be engaged, how much do their services cost and can that budget be approved on a Sunday night?  And what is the home phone number for the Director of IT?

Even for the most agile of companies, informed and responsible decision making requires the input of an array of constituencies, some of whom rarely, if ever, have been in the same room together. The classic example is the C-Suite and IT personnel.  The executives may have a difficult time understanding the scope of the breach, and the language IT speaks is decidedly not the language of the boardroom. The legal requirements can be contradictory—for example, a regulator (or the FBI) may ask that you notify no one, but your insurer may require notice within 10 days to trigger coverage.  The scope of the breach may be unknown, resulting in over-protection or even paralysis based on the lack of information.  These complications multiply with the size and public profile of the organization.

Preparation is Key

Of course, not every eventuality can be considered, and there is no need to try, but there are certain preparations that are almost invariably required.  Think about how a football coach would prepare: he would position his players, prepare them with a game plan and maybe even script/predetermine the first few plays before the team ever sets foot on the field.

Assemble Your Team

A data breach response plan, at a minimum, must identify key individuals, playing different positions, who will run the breach response.  They include:

  • a member of the C-Suite (typically the CIO if you are lucky enough to have one)
  • one or more IT professionals
  • the person who identified the breach
  • legal
  • public relations

There may be more individuals or departments required, depending on the size of the organization and the nature of the breach.  It is important, however, that the team is kept small enough to function, no matter the scope of the breach.  Your response plan should include a method of reaching each of these individuals that does not include company email (home phone numbers, cell phone numbers and personal emails).  Any email transmitted on a personal account should be brief and should be geared toward initiating a phone call—remember that personal email could be unsecure, and preservation of applicable privileges, including the attorney work product doctrine, is critical.

Simplify the Game Plan and Empower In Advance

The reality of a data breach response is that there are costs involved.  Let’s consider a hypothetical example: The IT department recommends retention of a forensic analyst to determine what happened to the data and when.  This analyst (which almost no company has in house) will cost $20,000 to get started.  Time is of the essence, because it is unclear whether data has been or continues to be exfiltrated from company servers.  Authority for this expenditure (and even the specific entity to be retained) should be delineated in advance.  Since the IT Director is the person most likely to understand this need, it probably should be his or her call whether the forensic investigator should be deployed immediately or whether it can wait.  Coordinating approvals through a variety of constituencies is difficult, can slow down response time and can implicate departments (such as accounting) that might not otherwise be involved in the immediate response.

Therefore, strong consideration should be given to a data breach plan that gives the most informed party, the IT Director, the discretion to act, and priorities should be identified and acknowledged at the outset.  In most cases, restoration of service is critical, and a good response plan should focus on that critical item first, with forensics to follow.  The bottom line is this: When in doubt, simplify.  Don’t require three approvals for an expense when one will do.  If the game plan is straightforward, it will be easier to execute when the pressure is on.

Designate a “Game Manager” Quarterback, and Consider Making it an Attorney

Football commentators tend to divide quarterbacks into two categories: the “gunslinger” and the “game manager.”  The gunslinger takes risks and throws interceptions, but can do some amazing things when the game is on the line. The game manager avoids risk, and his team probably scores fewer points, but he plays to the context of the game and lets the other players shine.  He “gets the ball to his play-makers.”

A breach response quarterback should be of the game manager variety.  Ideally, he or she will facilitate communication between critical constituencies and know when to stand aside and let those with the most information and expertise shine.  The breach quarterback should master the playbook in advance, knowing when to escalate decision making and when to empower individuals.  And the breach manager, like an NFL quarterback, should “touch the ball on every play,” meaning that he should act as a focal point for communications concerning all disciplines within the victimized organization so that efforts are coordinated, not duplicated.

Choosing an attorney to fill the role of “game manager” is a smart strategy.  First, to the greatest extent possible, the company should be afforded the option of protecting communications in relation to the response.  Having an attorney quarterback the process increases — but does not guarantee — attorney work product protection for communications in relation to the breach.  This is particularly important in analyzing the origin of the breach and remedial recommendations from IT personnel, who can get bogged down in technological terminology and nuances. If communications are sent to counsel, there may be a possibility of framing the issues at hand in better terms.

Second, communication with third-party regulators is necessary and can be arduous. It is highly advantageous to give regulators a consistent point of contact, and attorneys are typically best positioned to handle day-to-day communications with regulators.  And third, the organization will need to understand and tailor its communication strategy to the regulatory environment in any event. Determining which regulators, insurers and customers must be contacted is as critical as the content of the communication, and again, counsel can and should be consulted on this issue.

How to Win The Game

It should be noted that these are simply suggested core elements.  Depending on the size of the breach, the nature of the information involved and the consumer/patient base impacted, more features may be required.  The key is to plan and practice before a breach occurs.  While every eventuality cannot be anticipated, having a plan and practicing it will make on-the-fly adjustments easier and will position your organization for a successful resolution of a very difficult situation.


Tags: Communications Management
Previous Post

Value Versus Valuation

Next Post

Compliance 2016: What Small Businesses Can Expect

Christian Auty

Christian Auty

Christian Auty is a Principal at law firm Much Shelist. An experienced litigator, Christian has an established reputation as a strong client advocate and is well-versed in issues on the intersection of law and technology, including data privacy and data breach response, electronic discovery, data storage and retention practices and information governance. .

Related Posts

cubist style art of robot holding a pencil

Want to Be Part of the Generative AI Revolution? Start With Treating It Like an Assistant.

by Dave Cumberland
October 31, 2023

Integrating AI into internal communications can streamline how teams talk to each other

stack of newspapers on laptop

The Social Construction of a Scandal

by Michael Toebe
December 9, 2019

Do corporate execs and legal counsel truly understand the role news media plays in establishing the narrative about fault and...

woman holding smartphone with many "like" and "heart" reactions

Engaging Social Media is More Effective Risk Management

by Michael Toebe
October 25, 2019

Social media communication is a rarely implemented risk management tool, but it should get more play. Michael Toebe makes the...

black and white illustration of shark jumping out of water

The Shark in the Wave: Revealing the Lurking Danger of Slack Data

by James Murphy
June 17, 2019

Hanzo’s Jim Murphy explores the danger of Slack data; voluminous, informal, unstructured and context-dependent, it’s a threat hiding in plain...

Next Post
small businesses can expect more compliance requirements in 2016

Compliance 2016: What Small Businesses Can Expect

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
    • Upcoming
    • On-Demand
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights