Deeper Dive: Be Prepared For Regulatory Investigations In The Wake Of A Security Incident

B
BakerHostetler

Contributor

BakerHostetler logo
Recognized as one of the top firms for client service, BakerHostetler is a leading national law firm that helps clients around the world address their most complex and critical business and regulatory issues. With five core national practice groups — Business, Labor and Employment, Intellectual Property, Litigation, and Tax — the firm has more than 970 lawyers located in 14 offices coast to coast. BakerHostetler is widely regarded as having one of the country’s top 10 tax practices, a nationally recognized litigation practice, an award-winning data privacy practice and an industry-leading business practice. The firm is also recognized internationally for its groundbreaking work recovering more than $13 billion in the Madoff Recovery Initiative, representing the SIPA Trustee for the liquidation of Bernard L. Madoff Investment Securities LLC. Visit bakerlaw.com
Your company had a data security event. After an investigation, it was determined that notifications were required...
United States Privacy
To print this article, all you need is to be registered or login on Mondaq.com.

Your company had a data security event. After an investigation, it was determined that notifications were required, and the incident was made public as a result. Notification letters were mailed and regulators were notified, all in accordance with the law. Your company also enhanced security measures and took other remedial action, so there is nothing more to do – it's all over, right? Not quite – there is a good likelihood your organization may be subject to a regulatory investigation as a result of the incident.

In 2016, we assisted clients in over 450 data security incidents. Among the trends revealed by our analysis of these incidents, we found that regulators, including state attorneys general, continue to make inquiries in the wake of data security events. In fact, in the incidents we handled, attorneys general made inquiries 29 percent of the time after notifications were made. This is up from 26 percent the prior year.

This uptick in activity may be due to the fact that more states are now requiring notification to regulators after a breach. And no attorney general wants to appear weak on consumer privacy. So, to the extent a breach makes the news or may affect a large number of residents in a particular state, a regulatory investigation is increasingly likely to follow.

Accordingly, a prudent organization should be prepared to answer questions regulators might ask. The questions and information sought may include:

  • A description/diagram of your network environment.
  • A copy of the forensic investigation.
  • A detailed narrative description of the incident.
  • How was the intrusion detected? When was it detected and when was it stopped?
  • Copies of policies and procedures and your Written Information Security Plan.
  • Why did it take you so long to notify consumers?
  • Was law enforcement notified?
  • Are you offering credit monitoring? If so, for how many years?
  • Provide a timeline of the incident and investigation from discovery to notification.

How these questions are answered may very well determine whether further enforcement efforts are pursued, which could lead to fines and penalties. The issues that regulators will focus on include encryption, slow detection of incidents, slow notification and ignoring vulnerabilities identified in past risk assessments. Some states will automatically ask for a detailed timeline of the incident if notification took place more than 30 days after discovery.

In light of the increased regulatory activity, it's important to consider that incident response is more than just notifying affected individuals and complying with applicable laws. Any incident response strategy should also consider how the investigation, communications (internally and externally) and actions taken in response to the incident would be viewed by a regulator. This is why it is essential to view incident response as not just checking boxes, but as part of an overall legal strategy, taking into account potential regulatory investigations and enforcement.

Read more by downloading BakerHostetler's  2017 Data Security Incident Response Report

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

See More Popular Content From

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More