Seminar/CLE
Data Breach Simulations – Session III: Responding to Government Inquiries
Seminar/CLE
Data Breach Simulations – Session III: Responding to Government Inquiries
September 24, 2014
As hacking attacks are on the rise, breach notice law requirements are more likely to be triggered. This was the third session in our three-part series on data breach preparedness. In this session, we focused on what happens after you’ve done your investigations and after you’ve sent out your notices. Impacted individuals and state authorities know about the breach; so what’s next? During this session, we simulated dealing with an agency like the state AG or the FTC. We covered the steps from initial inquiry to formal CID (Civil Investigative Demand), to potential litigation and settlement. Our session “regulator,” wants to know if you had adequate measures in place to protect information, such that the incident could have been stopped.
Session I of this data breach simulation series was held on April 23, 2014 in Chicago (with a second running of it on June 26, 2014 in London) and handled dealing with the bad press around a data breach. Session II was held on June 3, 2014 in Chicago and looked at how to handle an internal investigation, including working with law enforcement during your investigations.