United States:
Data Breach Response: Orchestrating Legal And Technical Resources To Contain And Mitigate
24 March 2017
Lowndes, Drosdick, Doster, Kantor & Reed, P.A.
To print this article, all you need is to be registered or login on Mondaq.com.
Data breaches are inevitable and the
aftermath of a data breach can be a significantly difficult
exercise. When legal and technical resources work together, both
proactively and reactively, the response can run more smoothly.
Examples of proactive and reactive
guidance:
- — System data retentions to
ensure appropriate sets are available for post breach analysis
- — Breach response workflow
processes that integrate legal and technology resources
- — Post breach preservation
considerations
Click here to view the materials from a webinar we recently
hosted, providing practical guidance and workflow suggestions to
change potential cacophony into symphony.
The content of this article is intended to provide a general
guide to the subject matter. Specialist advice should be sought
about your specific circumstances.
POPULAR ARTICLES ON: Privacy from United States
Why Data Cleanup Fails – Part Two: Buy-In
Alvarez & Marsal
In this series of Insights, we delve into why data cleanup efforts so often fail, despite organizations' desire to get rid of data they no longer need.
Privacy Governance And Artificial Intelligence
Finnegan, Henderson, Farabow, Garrett & Dunner, LLP
The United States does not currently have a comprehensive federal privacy law, though multiple states have begun to fill the void in the absence of federal policy.
Top 15 Legal Issues In A SaaS Agreement
Outside GC
SaaS (Software as a Service) subscription arrangements are incredibly common these days. As hosting costs have come down and hosting reliability and stability have gone up...