Before a Breach Occurs
Privacy and Security Assessment Checklist
Engaging in a privacy and security assessment will help reduce your risk of a data breach while also putting your company in the strongest possible position to defend itself if a breach occurs. Critical components of a privacy and security assessment include the following:
Technical security measures are a critical component of your overall level of protection, including, among other things:
Incident Response Plan
If you don’t have an incident response plan, you need one. If you have one, now is a good time to review it. Either way, that plan should be tested regularly so you know it will work when the time comes. A tabletop exercise or other breach simulation is a great way to find out if your plan works the way you drew it up. The plan should make clear who will be called in to help when an incident occurs, and your lawyer should be your first phone call. The lawyer in turn should engage the forensics firm and other outside experts. This increases the chance that your company will maintain the protection of the attorney-client privilege as it responds to the incident, which will be critical when litigation ensues.
Identify and Map Your Data
Make sure you know what data you have, and where it is. That will help you make decisions about how best to protect your data, evaluate compliance with applicable data security laws, and respond more efficiently and effectively if an incident occurs.
Records Retention Policy
If you don’t have it, it can’t be stolen. So retain only the data the company needs for business operations; data that can be archived offline or destroyed, should be.
Contracts with Vendors and Business Partners
A vendor’s network could be used as a launching pad for an attack on yours. Review your contracts with vendors and other business partners to ensure that they appropriately address responsibility and liability for data security, and that they provide for regular audits to ensure compliance.
Employee Training on Cybersecurity
Data security is not just about technology; it’s also about processes and people. Your employees are your first line of defense, but also a potential vulnerability. One employee who carelessly opens a spear-phishing email, allowing malware to get onto your network, can undermine millions of dollars in security investments. For that reason, reviewing and enhancing your training for employees, emphasizing their shared responsibility for cybersecurity, is critical.
Privacy Notices and Practices
Do what you say, and say what you do. Compare your privacy notice with your company’s practices to make sure you’re actually doing what you say you’re doing.
No security is perfect, and the costs of a breach can be catastrophic, so ensuring that your insurance coverage is adequate – including response, remediation, and litigation costs – is critical to protecting your business.
Placing appropriate controls on access to data – including limiting access to personal and other sensitive information to only those employees who truly need it – will help mitigate the risk of attacks from both insiders and outsiders.
Due Diligence in M&A and Other Transactions
When you buy a company, you’re buying its data. And you may be buying its data security problems. For that reason, cybersecurity should be a critical component of your due diligence.
After a Breach Occurs
A breach is a crisis, and as with any crisis, the company benefits from the assistance of skilled and experienced crisis counsel and advisors including forensics, IT, and corporate communications professionals. The following are critical components of effective incident response: