Partner; Chair – Global Data Privacy and Security Practice; and Global Practice Group Leader – Technology, Commercial & Data, Boulder
Insights
Navigating a Security Incident - Best Practices for Engaging Service ProvidersWith the recent wave of ransomware and other security incidents, it is now more important than ever for impacted organizations to have a thorough understanding of each element of a proper data breach response. That includes consideration of attorney-client privilege and work product issues when retaining third party consultants and vendors. Indeed, since the original publication of this guidance, at least one more court has seen fit to require a defendant in a lawsuit arising from a data breach to produce not only a forensic breach report but most communications with a forensic breach response firm, reasoning that the firm’s work was sufficiently linked to business operations to require such discovery. See Leonard v. McMenamins Inc., No. C22-0094-KKE, 2023 WL 8447918 (W.D. Wash. Dec. 6, 2023). Caution in this area is warranted and the guidance below is as timely as ever.
Organizations experiencing a security incident must grapple with numerous competing issues simultaneously, usually under a very tight timeframe and the pressure of significant business disruption. Engaging qualified service providers is often critical to successfully resolving and minimizing the fall-out of the incident. These providers include forensic firms, public relations firms, restoration experts, and notification and call center vendors. Due to the nature of these services, they can have access to or even generate additional personal and sensitive information relevant to the incident. Protecting this information from third party or unauthorized disclosures during litigation, discovery, or otherwise, via the application of attorney-client privilege and the work product doctrine[1]is essential.
While there is no bright-line, uniform rule about how and under what circumstances these privileges attach to forensic reports and other information prepared by incident response providers, recent case law offers guidance as to how organizations can maximize the prospect that their assessments will remain shielded by the work product doctrine and/or the attorney-client privilege. Below we identify a set of “Dos” and “Don’ts” to help organizations more effectively engage their service providers with these goals in mind. We recommend that companies incorporate these principles into their Incident Response Plan and distribute to the incident response team at the outset of every incident response effort.
As recent case law has shown, there is no absolute way to guarantee the protection of the reports and other information prepared by incident response service providers. However, following the above practices should enhance the prospects that the work product and attorney-client privileges will apply and withstand any motions to compel during litigation and discovery. Also, thinking early and often about the process will help minimize risk in the event that such information must ultimately be disclosed.
For more information about this issue as well as about how Bryan Cave Leighton Paisner LLP can help assist you with incident response, preparedness and defense, please contact Amy de La Lama, Christian Auty, or Daniel Rockey.
More information on communication “Dos” and “Don’ts” for incident response >
[1] The standard used to determine if the work product doctrine applies is whether the document was prepared in anticipation of litigation. A series of recent decisions from federal courts interprets this standard as precluding application of the privilege if the document would have been created in essentially the same form in the absence of litigation for business continuity or other non-litigation purposes.
Meet The Team
Partner; Chair – Global Data Privacy and Security Practice; and Global Practice Group Leader – Technology, Commercial & Data, Boulder
Meet The Team
Partner; Chair – Global Data Privacy and Security Practice; and Global Practice Group Leader – Technology, Commercial & Data, Boulder
Partner; Chair – Global Data Privacy and Security Practice; and Global Practice Group Leader – Technology, Commercial & Data, Boulder
Back to top