ARTICLE
27 May 2025

Data Governance: Practical Considerations For A Reasonable Security Program

B
BakerHostetler

Contributor

Recognized as one of the top firms for client service, BakerHostetler is a leading national law firm that helps clients around the world address their most complex and critical business and regulatory issues. With five core national practice groups — Business, Labor and Employment, Intellectual Property, Litigation, and Tax — the firm has more than 970 lawyers located in 14 offices coast to coast. BakerHostetler is widely regarded as having one of the country’s top 10 tax practices, a nationally recognized litigation practice, an award-winning data privacy practice and an industry-leading business practice. The firm is also recognized internationally for its groundbreaking work recovering more than $13 billion in the Madoff Recovery Initiative, representing the SIPA Trustee for the liquidation of Bernard L. Madoff Investment Securities LLC. Visit bakerlaw.com
Imagine receiving an email from an unknown actor claiming to have taken approximately 2 terabytes of data from your organization's network.
United States Privacy

Imagine receiving an email from an unknown actor claiming to have taken approximately 2 terabytes of data from your organization's network. The threat actor provides a file tree and sample files to substantiate its claim. The file tree appears to consist of your organization's entire network file share. You quickly scan the file tree and find HR files dating back to ... wait for it ... 2005. Putting aside flashbacks to the days of flip phones and the iPod nano, your first thought likely is "Why do we still have these files?"

Effective information governance is challenging for organizations of all sizes and all maturities. To quote the 2025 Data Security Incident Response Report (DSIR):

Clients are often shocked to learn that files from 25+ years ago were stored on the File Share or that Jane in Accounting had been exporting and locally saving a monthly payroll report containing all current employees' and dependents' names and SSNs for the last several years.

Data retention may increase an organization's legal and regulatory risk. For example, a data breach of old HR files for an organization of 1,000 employees could result in having to notify approximately 33,000 to 44,000 individuals. How so? Let's do some math.

Data related to one employee may involve three or four Social Security numbers, when accounting for dependents. This means for a business of 1,000 employees, a data breach involving current HR files could result in notifying approximately 3,000 to 4,000 individuals. But when old data is involved, so are your former employees and their dependents. Let's say that dating back to 2005, you have 10,000 former employees. This same data breach could result in notifying approximately 33,000 to 44,000 individuals – an elevenfold increase. Not only is your notice population exponentially larger, but it is also far more complicated to manage the messaging to these individuals. In addition to communicating with current employees, you will be communicating with former employees, some of whom were involuntarily separated from your organization. You may need to communicate with estates of individuals who are now deceased. You may also have minors involved as dependents. Each of these groups may need a different approach from a communication and notification perspective.

Every organization should design a reasonable security program to fit its particular needs and risk tolerances. Organizations should develop effective information governance programs that include the following steps:

  1. Data Mapping: A data-mapping exercise can help your organization understand what data it maintains and how old such data is. Additionally, data mapping can tell your organization where the data is stored and how it is protected.
  2. Establish Data Retention Policies: Establish policies that detail the types of data to be retained, the retention periods and the procedures for securely disposing of the data. Regularly review and update these policies to reflect changes in regulatory requirements, business needs and emerging threats.
  3. If Needed, Securely Store Old Sensitive Data: If your organization needs to store old sensitive data, it should ensure that it is stored in a secured location – consider removing the data from the network entirely and storing it offline or encrypting it.

By implementing these steps, organizations can significantly mitigate risk posed by old data in the event of a data breach. Now to go find that old iPod ....

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

See More Popular Content From

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More