Secure Your Operations
Move quickly to secure your systems and fix vulnerabilities that may have caused the breach. The only thing worse than a data breach is multiple data breaches. Take steps so it doesn’t happen again.
- Secure physical areas potentially related to the breach.
Lock them and change access codes, if needed. Ask your forensics
experts and law enforcement when it is reasonable to resume regular
operations.
Mobilize your breach response team right away to prevent additional data loss. The exact steps to take depend on the nature of the breach and the structure of your business.
Assemble a team of experts to conduct a comprehensive breach response.
Depending on the size and nature of your company, they may include
forensics, legal, information security, information technology,
operations, human resources, communications, investor relations, and
management.
- Identify a data forensics team. Consider hiring
independent forensic investigators to help you determine the source and
scope of the breach. They will capture forensic images of affected
systems, collect and analyze evidence, and outline remediation steps.
- Consult with legal counsel. Talk to your legal
counsel. Then, you may consider hiring outside legal counsel with
privacy and data security expertise. They can advise you on federal and
state laws that may be implicated by a breach.
Stop additional data loss. Take all affected
equipment offline immediately — but don’t turn any machines off until
the forensic experts arrive. Closely monitor all entry and exit points,
especially those involved in the breach. If possible, put clean machines
online in place of affected ones. In addition, update credentials and
passwords of authorized users. If a hacker stole credentials, your
system will remain vulnerable until you change those credentials, even
if you’ve removed the hacker’s tools.
Remove improperly posted information from the web.
- Your website: If the data breach involved
personal information improperly posted on your website, immediately
remove it. Be aware that internet search engines store, or “cache,”
information for a period of time. You can contact the search engines to
ensure that they don’t archive personal information posted in error.
- Other websites: Search for your company’s exposed
data to make sure that no other websites have saved a copy. If you find
any, contact those sites and ask them to remove it.
Interview people who discovered the breach.
Also, talk with anyone else who may know about it. If you have a
customer service center, make sure the staff knows where to forward
information that may aid your investigation of the breach. Document your
investigation.
Do not destroy evidence. Don’t destroy any forensic evidence in the course of your investigation and remediation.
Move quickly to secure your systems and fix vulnerabilities that may have caused the breach. The only thing worse than a data breach is multiple data breaches. Take steps so it doesn’t happen again. Secure physical areas potentially related to the breach. Lock them and change access codes, if needed. Ask your forensics experts and law enforcement when it is reasonable to resume regular operations.Mobilize your breach response team right away to prevent additional data loss. The exact steps to take depend on the nature of the breach and the structure of your business. Assemble a team of experts to conduct a comprehensive breach response. Depending on the size and nature of your company, they may include forensics, legal, information security, information technology, operations, human resources, communications, investor relations, and management. Identify a data forensics team. Consider hiring independent forensic investigators to help you determine the source and scope ...read more |
Notify individuals. If you quickly notify people that their personal information has been compromised, they can take steps to reduce the chance that their information will be misused. In deciding who to notify, and how, consider: state lawsthe nature of the compromisethe type of information takenthe likelihood of misusethe potential damage if the information is misused For example, thieves who have stolen names and Social Security numbers can use that information not only to sign up for new accounts in the victim’s name, but also to commit tax identity theft. People who are notified early can take steps to limit the damage. When notifying individuals, the FTC recommends you: Consult with your law enforcement contact about the timing of the notification so it doesn’t impede the investigation.Designate a point person within your organization for releasing information. Give the contact person the latest information about the breach, your response, and how ...read more |
When your business experiences a data breach, notify law enforcement, other affected businesses, and affected individuals. Determine your legal requirements. All states, the District of Columbia, Puerto Rico, and the Virgin Islands have enacted legislation requiring notification of security breaches involving personal information. In addition, depending on the types of information involved in the breach, there may be other laws or regulations that apply to your situation. Check state and federal laws or regulations for any specific requirements for your business. Notify law enforcement. Call your local police department immediately. Report your situation and the potential risk for identity theft. The sooner law enforcement learns about the theft, the more effective they can be. If your local police aren’t familiar with investigating information compromises, contact the local office of the FBI or the U.S. Secret Service. For incidents involving mail theft, contact the U.S. Postal Inspection Service. Did the ...read more |
Covered entities and business associates must only provide the required notifications if the breach involved unsecured protected health information. Unsecured protected health information is protected health information that has not been rendered unusable, unreadable, or indecipherable to unauthorized persons through the use of a technology or methodology specified by the Secretary in guidance. This guidance was first issued in April 2009 with a request for public comment. The guidance was reissued after consideration of public comment received and specifies encryption and destruction as the technologies and methodologies for rendering protected health information unusable, unreadable, or indecipherable to unauthorized individuals. Additionally, the guidance also applies to unsecured personal health record identifiable health information under the FTC regulations. Covered entities and business associates, as well as entities regulated by the FTC regulations, that secure information as specified by the guidance are relieved from providing notifications following the breach of such information. ...read more |
|
July 2025
Su | Mo | Tu | We | Th | Fr | Sa |
| | 1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 | 11 | 12 |
13 | 14 | 15 | 16 | 17 | 18 | 19 |
20 | 21 | 22 | 23 | 24 | 25 | 26 |
27 | 28 | 29 | 30 | 31 |
Blog Home
Newest Blog Entries
1/21/25 Healthcare Data Breaches and Their Devastating Impact
1/21/25 Your Essential Guide to Data Breach Reporting Procedures
1/21/25 Understanding Your Obligations in Data Breach Reporting
11/16/22 Administrative Requirements and Burden of Proof
11/16/22 Notification by a Business Associat
11/16/22 Breach Notification Requirements
11/16/22 Unsecured Protected Health Information and Guidance
11/16/22 Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals
11/16/22 Definition of Breach
11/16/22 Breach Notification Rule
11/16/22 Notify Individuals
Blog Archives
January 2025 (3) November 2022 (11)
Blog Labels
Data Breach Reporting (6) Data Breach Notification (6) Health Care Data (1) ePHI Data (1)
|