Stage 1: Detect & Handle
This initial stage begins when a potential compromise is
identified. Speed and proper escalation are critical. Detection can come from internal
systems, an employee report, a customer call, or even a news article.
Critical Terminology: Incident vs. Breach
Not all incidents are breaches. An Incident is a potential compromise. A
Breach is a legal term, defined by law, that triggers specific
notification obligations. Do not use the word "breach" until Legal has made a formal
determination.
Key Actions:
- Train Employees: All employees must know how to
recognize and report a potential incident immediately.
- Standardize Reporting: Use worksheets to capture
initial facts: date, time, data type, and description of the event.
- Escalate Immediately: The report must go to the
designated authority (e.g., Privacy Office or Legal) to begin the formal response.
- Control Communications: All internal communication
must be locked down and on a strict "need-to-know" basis to prevent misinformation and
protect privilege.
Stage 2: Investigate & Contain
Once an incident is declared, the investigation and containment
efforts begin simultaneously. This stage is a delicate balance between stopping further
damage (IT) and preserving evidence for legal analysis (Legal).
The Importance of Legal Privilege
All investigation activities must be directed by legal counsel (preferably outside
counsel). This protects communications and work product under attorney-client
privilege or the attorney work product doctrine,
preventing them from being used against the company in future litigation.
Key Actions:
- Contain the Threat: Secure physical areas, block bad
actors' access, and take affected systems offline.
- Engage Forensics: Retain third-party forensic experts
(engaged by Legal) to determine the cause, scope, and what data was compromised.
- Preserve Evidence: Ensure a sound chain of custody
for all evidence.
- Fix Vulnerabilities: Analyze and patch the
vulnerabilities that allowed the incident to occur.
- Notify Insurers: Immediately notify all insurance
providers, as coverage may be available under multiple policies.
Stage 3: Report & Notify
After the investigation, Legal will determine if the incident
constitutes a legal "breach" requiring notification. If so, this stage involves a massive,
coordinated effort to communicate with regulators, affected individuals, and the public.
Key Actions:
- Regulator Notifications: Legal will guide
notifications to all required agencies (e.g., State Attorneys General, FTC, HHS, or
international DPAs).
- Internal Announcements: Provide properly worded
communications to all employees with a strict directive to defer all external inquiries
to the designated spokesperson.
- External Announcements: Coordinate press releases and
public statements (led by PR/Legal) to ensure a consistent, accurate message.
- Letter Drops: Manage the complex production and
delivery of notification letters to affected individuals, often in coordination with a
print vendor.
- Call Center Launch: Activate a dedicated call center
(internal or outsourced) with trained agents and approved scripts to handle inquiries.
- Remediation Offers: Provide services like credit
monitoring or identity theft protection, including activation codes in the notification
letter.
Stage 4: Recover & Improve
The crisis may be over, but the work is not. This final stage is
about learning from the incident to build a more resilient organization. A failure is an
opportunity for growth, funding, and renewed commitment.
Key Actions:
- Conduct a Post-Incident Assessment: Carefully
evaluate the response. What worked? What failed? Were timelines realistic? Was the team
sufficiently staffed?
- Incorporate Lessons Learned: Update the incident
response plan and BCP with actionable insights from the assessment.
- Calculate Total Costs: Quantify all tangible (legal
fees, call center) and intangible (lost business, brand damage) costs to understand the
full impact.
- Renew Commitment: Use the incident as a business case
to renew funding, focus, and C-suite commitment to the privacy program, staffing, and
resources.