No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Cybersecurity

Navigating Personal Liability: Post–Data Breach Recommendations for Officers

Executives may be on the hook if info is compromised

by Daniel B. Garrie and Richard A. Kramer
April 16, 2024
in Cybersecurity
characters breaking into padlock

A data breach doesn’t just pose risk to an organization or those whose information was accessed or leaked. Increasingly, regulators and other authorities are signaling their intention to hold company executives liable in many cases. Daniel B. Garrie and Richard A. Kramer, both mediators with JAMS, offer guidance on navigating the aftermath of a data breach for CSOs and CISOs.

In the interconnected world of digital information, the risk of a data breach has increased exponentially. A data breach can have significant financial, reputational, legal and emotional implications for an organization, its personnel and clients and others. When a data breach occurs, people want to know how it will affect them personally. Not only is their financial well-being at risk, but their privacy has been invaded. Government regulators and politicians often spring into action after a data breach for a wide range of purposes.

For a chief security officer (CSO) and chief information security officer (CISO), a breach presents unique consequences, including potential personal liability. In cases where it can be demonstrated that the CSO or CISO acted negligently or failed in their duties, they could be held personally liable. This could result in financial penalties, disqualification from holding a director or officer position in the future and, in extreme cases, criminal charges.

Upon learning of a data breach, contact your organization’s legal counsel; this is the most important action to take in the wake of a breach. A checklist for your initial discussions with the lawyers should include the following:

  1. Who in your organization should be advised of the data breach and who, whether or not within your organization, should not.
  2. Whether the lawyers can and will be representing you personally as well as your organization and, if not, how you might go about finding counsel.
  3. Ask to be educated (or refreshed) on attorney-client privilege. Attorney-client privilege is a critical protection that must be preserved, regardless of whether legal action is taken as a result of the breach.
  4. Ask about a litigation hold, which is a directive instructing everyone in your organization to preserve all documents, even those that are normally destroyed in the regular course of business. Counsel will determine the scope of such instruction, but everyone should understand how it applies to their particular role. Nobody wants to be accused of destroying evidence.
  5. If you are not the CSO or CISO, ask counsel to contact these people.
  6. Ask about documents to be turned over to counsel. This will likely include the materials submitted with the claim by the claimant, documentation regarding the claim that are within your organization, any policy or applicable guidelines regarding data security and any materials already generated or gathered by you.
  7. Be prepared to provide counsel with a detailed description of your knowledge of the incident, along with the identification of any other organization-controlled individuals who may be involved and any supporting documentation. Counsel can guide the incident response and provide legal advice to limit both the organization’s and your personal liability.
  8. Ask counsel about anything else that comes to mind. If it raises your concern, it is worth sharing with counsel.

Counsel will likely ask you to document what you know about the incident and instruct you how to do so. All relevant details are important. These include the date and time the breach was discovered, the nature of the breach, the types of data involved, the number of individuals affected, any immediate steps already taken and anything else that is pertinent. 

solarwinds corporate building
Cybersecurity

Winds of Warning? SEC Charges Threaten to Disrupt Role of CISO

by Paul Caron
April 3, 2024

SEC allegations against a cybersecurity executive over a 2020 cyber incident have sent ripples through the industry. Paul Caron of cybersecurity consultancy S-RM digs into the case and explains why it could have a chilling effect on CISO employment.

Read moreDetails

While the entire scope of relevant information may not yet be apparent, you should err on the side of being more inclusive. Your documentation should be prepared as close in time to the breach as practical to capture your recollections as well as information that may reside in people who could leave the organization. This documentation is critical to help guide internal and external investigations, assist in regulatory compliance and help reduce the impact of potential legal proceedings.

It can be tempting for CSOs and CISOs to take the reins in data breach incidents, given their technical expertise or sense of personal responsibility. However, this can lead to unintended legal complications. In the aftermath of a data breach, it’s critical to let your organization’s legal counsel guide decision-making processes. They can ensure that the response to the data breach complies with applicable laws and that both communication and remediation efforts are handled appropriately to minimize potential liability.

In addition to protecting the organization, the CSO and CISO may want to seek personal legal advice. Although it’s rare to face personal liability or criminal charges, it can happen. Independent legal advice can provide guidance tailored to your specific situation, identify where your interests may be different from those of your organization and allay your concerns — all of which is protected under attorney-client privilege.

After a data breach, effective communication is crucial. Legal counsel should guide the crafting of public statements to ensure they are accurate, timely and compliant with legal obligations. Remember, providing incorrect or misleading information can increase liability risks. Public information can also positively or negatively affect the public’s concern over their personal financial and privacy risks. Consult with legal counsel before making any public statements or communicating with affected parties.

Data breaches often involve various regulatory agencies. Cooperate fully with any investigation while also protecting the interests of the organization. This cooperation should be guided by legal counsel to ensure that it does not inadvertently increase liability.

Post-incident, review the causes of the breach and update security measures accordingly. This helps prevent future incidents and demonstrates a commitment to security, which can help limit liability. Legal counsel should be involved in this process to ensure any changes align with regulatory requirements.

Unfortunately, data breaches have become so common that organizations are preparing for when one happens, not if. It is prudent to implement a robust incident response plan (IRP) so it’s there when needed. If your organization does not have one, develop one. An IRP can help prevent knee-jerk reactions, demonstrate a good-faith effort to address the situation and provide a solid basis for defense if faced with legal claims. 

The key to minimizing personal liability for CSOs and CISOs after a data breach is to act responsibly and reasonably.  In order to meet this standard, one should engage with counsel and follow their advice, communicate effectively and demonstrate a commitment to addressing the breach and preventing future incidents. By following these recommendations, CSOs and CISOs can navigate the challenging terrain of a data breach while minimizing their own risk of personal liability.

Anna Diaz Gessner contributed to this report.

 


Tags: Data Breach
Previous Post

As States Continue to Act on Data Privacy, Big Tech Should Play Its Role, Too

Next Post

A Comprehensive Global Guide for AI Data Protection in the Workplace

Daniel B. Garrie and Richard A. Kramer

Daniel B. Garrie and Richard A. Kramer

Daniel B. Garrie is a distinguished neutral with JAMS, an arbitrator, mediator and special master with a focus on cybersecurity, data privacy, e-discovery and intellectual property. He is the founder and managing partner of Law & Forensics, where he leads the cybersecurity and forensic practice teams and frequently testifies as an expert witness on e-discovery, cybersecurity and computer forensics. Additionally, he is a fellow of the Academy of Court-Appointed Neutrals. He is also a professor at Harvard in the School of Continuing Education, teaching courses on cybersecurity law, information security and computer forensics.
Richard A. Kramer serves as an arbitrator, mediator and special master at JAMS in a variety of disputes, including business/commercial, class action/mass tort, construction, employment, environmental, financial markets and insurance. Prior to joining JAMS, Kramer served for nearly 20 years on the San Francisco Superior Court. For 13 years, he presided over cases in the court’s complex litigation department.

Related Posts

new york and us flags

New York Tightens the Breach Clock: 30 Days to Notify

by Melissa Crespo and Reiley Porter
May 12, 2025

State joins growing national trend toward broader personal information definitions and stricter notification timelines for data compromises

group looking at data breach details digital art collage

Navigating Data Breach Compliance & Communication

by Salim Gheewalla
October 28, 2024

Compliant response starts well before an incident occurs

sec building

News Roundup: SEC Finalizes New Cybersecurity Rules for Broker-Dealers, Others

by Staff and Wire Reports
May 16, 2024

OFAC launches public-facing sanctions database

data breach

Sobering Reality: Drizly Order Indicates Officers May Face Personal Liability for Data Breaches

by Baker Donelson
February 1, 2023

The FTC says Drizly’s CEO James Cory Rellas was alerted to a potential security loophole two years before a data...

Next Post
retro robots lined up

A Comprehensive Global Guide for AI Data Protection in the Workplace

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights