Perform a Risk Assessment
» Find out what data was compromised and how it happened
» Assign an expert, with the knowledge and expertise, to head the investigation and locate the source of the breach
» Walk through the office and identify additional areas of risk – i.e. blue bins, messy desks, unsecured printers
Get Expert Legal Advice
» Bring in legal team to decide if announcement needs to be made to stakeholders
» You may not even have to disclose the breach and your legal team can explain the repercussions of any actions you may take
Conduct a Policy Review to Prevent
Another Breach from Happening Again
» Assess current policies and see where information security gaps lie
» Bring in third party providers, like Shred-it, to conduct a comprehensive Security Risk Assessment of your business and provide recommendations for improvements
» Consider implementing a Clean Desk Policy and a Shred-it All Policy to shred all documents after their use
» Get buy-in from management and use a top-down approach to embed a culture of total security
Here are some examples of the types of data that must be disclosed if there is a security breach:
» Data that falls under IPAA, SOX, PCI or FTC safeguards or state privacy laws must bedisclosed if it’s breached.
Example: If only a computer has been compromised, you may not need to disclose that security event, as long as the rights of any individuals involved remain protected.
» Regulated data must be disclosed if it’s breached, and includes Social Security numbers, government ID numbers, payment card information and account numbers. Your local regulations may specify other data covered by law.*
Federal law requires banks to inform customers of breaches; 46 states have laws mandating that other companies do the same.
1 Ponemon Institute. 2017 Cost of Data Breach Study: Global Overview.
*This document is not intended to substitute for legal advice. It’s very important to have your attorney involved immediately when considering action regarding a breach.
“Data and privacy protection have moved from being a corporate afterthought to becoming a driving risk reduction mechanism for companies. Any CEO, COO, ISO or business owner who is not seriously evaluating the role of privacy protection and data in their operation is living on borrowed time.”
— Eduard Goodman,
IDT 911’s Chief Privacy Officer