Partner; Chair – Global Data Privacy and Security Practice; and Global Practice Group Leader – Technology, Commercial & Data, Boulder
Insights
Navigating a Security Incident - Communication “Dos” and “Don’ts”Communication during a data breach is challenging in the best of circumstances, and control of information, especially early in a breach response, is critical. Below are some DOs and DON’Ts for communicating during a data breach. If you have any questions about this guidance or other issues relating to incident response preparation, please do not hesitate to contact our team.
The security incident response process inevitably brings a myriad of challenges for a company unfortunate enough to experience one. Although implementing an appropriate communication strategy may not be at the top of the list of the initial concerns for a company in the throes of a ransomware attack or other type of security incident, it should be. Appropriate communication discipline will help protect attorney-client privilege and similar legal protections and mitigate the significant risks (legal, reputational, financial) associated with the unintended disclosure of incident-related communications.
With this in mind, we have included below a set of Communication Dos and Don’ts to help companies approach this aspect of the incident response process. To implement the Dos and Don’ts, we recommend that companies work these principles into their Incident Response Plan and disseminate them to the incident response team at the outset of every incident response effort. It will also be important to remind internal teams and external service providers that while copying internal or external legal counsel on communications, as well as designating materials as subject to Attorney-Client Privilege and/or designating materials as “Work Product”, are important steps, doing so will not automatically create relevant legal privileges. Moreover, there is always the risk that communications may inadvertently be sent to the wrong recipients and/or acquired either as part of the legal process or by the bad actors themselves. Therefore, thinking carefully about the content and manner of dissemination is essential in mitigating the inevitable fall-out from a security incident and moving forward as quickly as possible.
When in doubt, pick up the phone and obtain input from either your internal or external legal counsel prior to sending a written communication. Communication is a key and integral component of a strong response to incidents and having and following your protocol provides a mechanism for rapidly notifying stakeholders, coordinating internal and external stakeholders, monitoring customer or employee sentiment, and minimizing reputational damage, all while protecting your company’s interest and legal privileges.
For more information about this topic or about how BCLP can help assist you with incident response and preparedness (i.e., tabletop exercises), please contact Amy de La Lama, Christian Auty or Daniel Rockey.
Meet The Team
Partner; Chair – Global Data Privacy and Security Practice; and Global Practice Group Leader – Technology, Commercial & Data, Boulder
Meet The Team
Partner; Chair – Global Data Privacy and Security Practice; and Global Practice Group Leader – Technology, Commercial & Data, Boulder
Partner; Chair – Global Data Privacy and Security Practice; and Global Practice Group Leader – Technology, Commercial & Data, Boulder
Back to top