No organization, big or small, is immune to a data breach. Many small employers falsely believe they can elude the attention of a hacker, yet studies have shown the opposite is true—a growing number of companies with fewer than 100 employees are reporting data breaches every year. Data breach response policies are essential for organizations of any size. A response policy should outline how your company will respond in the event of a data breach and lay out an action plan that will be used to investigate potential breaches to mitigate damage should a breach occur.

Defining a data breach

A data breach is an incident where Personal Identifying Information (PII) is accessed and/or stolen by an unauthorized individual. Examples of PII include:

Internal responsibilities upon learning of a breach

A breach or a suspected breach of PII must be immediately investigated. Since all PII is of a highly confidential nature, only personnel necessary for the data breach investigation should be informed of the breach. The following information must be reported to appropriate management personnel:

Once basic information about the breach has been established, management should make a record of events and people involved, as well as any discoveries made over the course of the investigation to determine whether or not a breach has occurred. Once a breach has been verified and contained, perform a risk assessment that rates the:

Government regulation

There aren’t many federal regulations regarding cybersecurity, and the few that exist largely cover specific industries. The 1996 Health Insurance Portability and Accountability Act (HIPAA), the 1999 Gramm-Leach-Bliley (GLB) Act and the 2002 Homeland Security Act, which includes the Federal Information Security Management Act (FISMA) mandate that health care organizations, financial institutions and federal agencies, respectively, protect their computer systems and information. The language is generally vague, so individual states have attempted to create more targeted laws regarding cybersecurity.

California led the way in 2003 by mandating that any company that suffers a data breach must notify its customers of the details of the breach. In 2018, Alabama became the final state in the country to enact a data breach notification law. While notification laws vary from state to state, all include four basic provisions:

1. All notification laws put a number on how long companies have to notify customers of a data breach and by what medium the notice will be given (written, email, press release, etc.).

2. Laws set forth a penalty system (that differs from state-to-state) for failure to notify customers in a timely manner.

3. Depending on the specifics of the breach, customers can sue the company for its part in the data breach.

4. All notification laws have exceptions in a range of situations.

Your notification responsibilities

Responsibility to notify is based both on the number of individuals affected and the nature of the PII that was accessed. Any information found in the initial risk assessment should be turned over to the legal counsel of your company who will review the situation to determine if, and to what extent, notification is required. Notification should occur in a manner that ensures the affected individuals will receive actual notice of the incident. Notification should be made in a timely manner, but make sure the facts of the breach are well established before proceeding. In the case that notification must be made:

The notification letter should include:

We can help you recover from a data breach

Preferred understands the negative effects a data breach can have at your organization. Contact your Preferred Loss Control Consultant today so we can show you how to recover from a breach and get your company back on its feet.

In addition, Preferred offers members assistance with their cybersecurity exposures at no additional cost. Read more in the Preferred Cybersecurity Bulletin.

This Cyber Risks & Liabilities document is not intended to be exhaustive nor should any discussion or opinions be construed as legal advice. Readers should contact legal counsel or an insurance professional for appropriate advice. © 2012-2014 Zywave, Inc. All rights reserved.