Responding effectively to a data breach requires an organization to obtain a thorough forensic report about what happened and why. Yet this report can damage the company further if it becomes public inadvertently. Members of our cross-practice data protection team discuss how to protect a forensic report under privilege. The insights of Leah Parsons, Ericka Johnson, and Colin Jennings can be found here. A related article on cyber and data breach preparedness and response can be found here.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.