10. Operations: Data Breach Incident Plans Flashcards

1
Q

What does the CCPA and the GDPR address regarding data breaches?

A

CCPA: provides statutory damages

GDPR: addresses how a company responds to a breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When a company faces privacy breach litigation, what factors are condidered?

A
  1. Obligation to prevent unauthorized access to or use of the data
  2. If the company satisfied an applicable industry standard of care
  3. Whether there were damage or injury
  4. If the organization’s conduct or lack thereof was the proximate cause of the damages
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the average cost of a data incident (Ponemon Institute)?

A

$3.86 M and cost per individual record lost is $ 146.

Loss of revenue

Class action litigation and settlement amounts

Impact on business relationship with third parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the difference between a security incident and a breach?

A

Incident: confidentiality, integrity, or availability of PI may be potentially compromised.

Breach: unauthorized access or acquisition of PI. Breach is a legal term and definitions may vary. If a breach exists impacted individuals and regulatory authorities must be notified.

Breaches are incidents but not all incidents are breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What measures can a company take to prepare for incidents?

A
  1. Training
  2. Incident response plan
  3. Insurance coverage
  4. Vendor management (if part of the incident)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does training help with data incidents?

A

It exposes gaps in applications, procedures, and pre-incident plans.

Has the potential to reduce financial liability and regulatory exposure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What should be considered when putting together an incident response plan?

A
  1. Type of PI collected
  2. Format and method of collection
  3. Third-party relationships
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of an incident response plan?

A

Map for people in the organization to let them know what to do. The plan should include regulatory requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What makes an incident response plan successful?

A

How effectively stakeholders and constituent teams execute assigned tasks a crisis unfolds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Who should be involved in an incident response?

A
  1. IT or information security
  2. HR/marketing
  3. Customer relationship management
  4. Audit and compliance
  5. Shareholder management
  6. Business development
  7. Communications and PR
  8. Union leadership
  9. Finance
  10. President, CEO
  11. BOD
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What may cyber-liability insurance cover?

A
  1. Forensic investigations
  2. Outside counsel fees
  3. Crisis management services
  4. PR experts
  5. Breach notification
  6. Call center costs
  7. Credit/identity monitoring
  8. Fraud resolution and restoration services
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Business Continuity Plan (BCP)?

A

A plan drafted and maintained by key stakeholders and spells out departmental responsibilities and actions teams must take before, during, and after an event. Situations covered: fire, natural disaster, and terrorist attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a tabletop exercise?

A

A structured readiness-testing activity that simulates an emergency situation, such as data breach, in an informal, stress-free setting. It prepares people and identifies gaps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why should incident response plans and BCPs be current and tested?

A

There is little strategic, practical, or economic value to a plan that is painstakingly developed but seldom tested or improved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the benefits to investing in breach preparedness training?

A
  1. Exposure of critical gaps in applications, procedures, and plans in a pre-incident phase
  2. Greater overall security for customers, partners and employees
  3. Reduced financial liability and regulatory exposure
  4. Lower breach-related costs, including legal counsel and consumer notification
  5. Preservation of brand reputation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the challenges to breach preparedness training?

A

It requires an organization-wide commitment backed by resources to see it through.

Many businesses utilize a shared-cost arrangement that equitably split training costs among participating stakeholder groups (IT, finance, and HR)

17
Q

What costs are incurred responding to a breach?

A
  1. Threat isolation
  2. Forensic investigation
  3. Engaging of legal counsel
  4. PR communications and media outreach
  5. Reporting and notification (printing, postage, call center)
18
Q

Is incident handling a linear process?

A

No. Incidents are handled in parallel steps along the following broad categories:

  1. Secure operations
  2. Notify appropriate parties
  3. Fix vulnerabilities
19
Q

Who should review and approve an incident preparedness plan?

A

Internal or external legal counsel.

Consideration should be given to:

  1. How to best protect the potentially discoverable documentation including tracking and other workflow tools that are created during the incident.
  2. Consider issues of privilege and determine what consent should be documented
20
Q

What should organizations ensure during layoffs and departures?

A

A procedure for retrieving portable storage devices or media is in place.

21
Q

What is the responsibility of a data breach response team leader?

A
  1. Keep individual response team members on track to meet their performance objectives and timelines
  2. Track budget adherence for all response activities
  3. Contact outside incident response resources to confirm engagement and monitor performance
  4. Prepare a final analysis of the response effort
  5. Lead a post response evaluation process
22
Q

How many levels are there to a response team?

A

Two:

  1. Leaders - make the key decisions about how the incident is handled
  2. Individuals who will be providing input and support to the core team.
23
Q

What is the focus of an investigation regarding containment and legal?

A

Containment: focus on isolating compromised systems, containing the damage and documenting any actions taken

Legal: focus on determining whether the event constitutes a breach as defined by relevant laws, preserving electronic evidence, and establishing a chain of custody