Follow Kara Linkedin Twitter Facebook
Email Kara Email
Legal Issues
May 1, 2016

Creating A Breach Response Plan For A Cyber Attack

Sponsored Content provided by Kara Gansmann - Attorney, Cranfill Sumner & Hartzog LLP

In this series on liability for cybersecurity breaches, the fifth component of a sound cybersecurity plan includes developing a breach response plan for when or if your business is hacked. The breach response plan should identify the employees and vendors who will implement the plan, develop a timeline for your plan, and incorporate the following objectives.
 
Know Your First Steps 

  • Identify what data was compromised. The type of data – whether it’s financial data or consumer data, for example – may dictate your business’s response and implicates the potential for liability. Also, determining whether the data was encrypted and whether and how much data was removed from your system will help you decide what response is necessary.
  • Locate the source of the breach. Not only should you determine the source of the compromise, you should also determine the size of the breach.
  • End vulnerabilities. If a computer is compromised, disconnect it immediately from your network. Ensure your firewalls are still working. Patch any known vulnerabilities in your software.
Know Who to Call
  • Call your cybersecurity experts. These experts will isolate the breach and identify remaining threats.
  • Inform your cyber insurer. Your cyber insurance policy may defray the costs of a response, ranging from an initial $2,000 to $10,000, or even cover the higher costs of litigation arising from the breach.
  • Call your legal counsel. Keep your attorney updated to learn what materials are necessary to retain for any litigation or regulatory investigation. 
  • Notify consumers. North Carolina law requires notification to consumers affected by the breach. Know the laws on how and when to inform consumers. If you have a privacy policy for your customers, ensure compliance with that policy to minimize potential for liability. Liability may turn on the adequacy and timing of your notice to consumers.
  • Contact the North Carolina attorney general. North Carolina law also generally requires businesses to inform the Consumer Protection Division of the state attorney general’s office of a breach involving personal information.
  • Advise your vendors or other business contacts. To further limit your liability, if you have vendor contracts, you may be required to inform vendors of a data breach. Even without a contract, to maintain goodwill with these professional contacts who might be affected by the breach, you should inform them of the breach. 
  • Consider whether a PR professional can help. The damage to your business from a security breach is not limited to the cost to deal directly with the breach. Your reputation can suffer the greatest harm, and having a PR professional on your side can help minimize the impact.
Other Considerations
  • Cooperate with law enforcement investigators and consult with legal counsel.
  • Communicate with your employees about the breach and confirm they know the proper responses to customers’ questions about the breach.
  • Plan your business’s responses to media inquiries and ensure that your employees know who is permitted to respond publically for your business.
  • Strategize ways to keep your business running post-breach. 
Kara Gansmann, a North Carolina native, is an associate in Cranfill Sumner & Hartzog LLP’s Wilmington office, where she focuses her litigation and appellate practice on various aspects of labor and employment law, business and contractual disputes, medical malpractice, and HOA matters. To contact Kara Gansmann, call (910) 777-6055 or email her at [email protected].
 

Other Posts from Kara Gansmann

Wbj insights revised 0510 121615113531
Ico insights

INSIGHTS

SPONSORS' CONTENT
Jim ellis headshot 10311631058

Five Tips on Balancing Convenience and Privacy

Jim Ellis - Signal
Chadwoutersheadshot

Disaster Relief: Employers Helping Employees

Chad Wouters - Earney & Company, LLP
Burrus rob headshot 300x300

Information Systems, “Mad Money” and NASA: How Are They Connected?

Robert Burrus - Cameron School of Business - UNC-Wilmington

Trending News

Blaze Pizza Set To Open Wilmington Location Next Week

Jessica Maurer - Dec 11, 2018

Pender County To Get Another Distribution Firm

Christina Haley O'Neal - Dec 13, 2018

Junction 421 Replaces Osteria Cicchetti In Monkey Junction

Cece Nunn - Dec 12, 2018

Recruiters Talk Challenges In Hiring And Retaining Tech Talent

Johanna Cano - Dec 12, 2018

'Most Intriguing' Talks Focus On Economic Projects, Inclusion Efforts

Christina Haley O'Neal - Dec 11, 2018

In The Current Issue

Cape Fear Museum Gets Smithsonian Affiliation

Cape Fear Museum of History and Science has received a coveted designation. The museum is now one of only seven organizations in the state t...


Rulmeca Rolls Into New Space

A Wilmington-based company that produces motorized pulleys for a variety of markets has moved into a new, larger space to meet an increasing...


Supplying This Year's Oyster Season

Like many oyster farmers in the area, Conor MacNair had to contend with damage from Hurricane Florence as well as customer perceptions about...

Book On Business

The 2018 WilmingtonBiz: Book on Business is an annual publication showcasing the Wilmington region as a center of business.

Order Your Copy Today!


Galleries

Videos

2018 Power Breakfast - Dishing on the Restaurant Biz
2018 WilmingtonBiz Expo - Keynote Lunch with Eric Dinenberg, Rouse Properties
2017 Health Care Heroes