Data Breach Incident Response Plan Toolkit: Lawyers Mutual
Data Breach Incident Response Plan Toolkit: Lawyers Mutual
Data Breach Incident Response Plan Toolkit: Lawyers Mutual
Data
data Breach/Data Lossloss
breach/data
Incident
Incident
Response
Reponse
Plan
Plan
Date: ____________________
sample incident response plan
Table of Contents
Approval Signature 2
Introduction 2
Notification 9
Disclaimer: This document is written for general information only. It presents some considerations that might be helpful in your practice. It is not intended as legal
advice or opinion. It is not intended to establish a standard of care for the practice of law. There is no guarantee that following these guidelines will eliminate mistakes. Law
offices have different needs and requirements. Individual cases demand individual treatment. Due diligence, reasonableness and discretion are always necessary. Sound risk
management is encouraged in all aspects of practice.
July 2016
sample incident response plan
APPROVAL SIGNATURE
Signed: _______________________________
Date: _______________________________
INTRODUCTION
Our incident response plan has been developed to reduce the exposures to our organization, our customers/
employees, and our partners that arise out of a data theft or data loss incident. We have an affirmative duty to
protect our customer information and to properly respond to an incident that is both part of our Security Plan and
that is required by law. (Your State Law)
In order to comply with (Your State Law) and following our Security Plan, our incident response plan specifically
includes policies and procedures to:
• Assess the nature and scope of an incident, and identify what customer information systems and types of
customer/employee information have been accessed or misused
• Contain and control the incident to prevent further unauthorized access to, or misuse of, customer
information, while preserving records and other evidence
• Notify appropriate law enforcement agency
• Maintain or Restore Business Continuity
• Notify customers/employees when warranted
This plan further outlines procedures that we will implement and/or consider in the event an incident occurs. All
staff is required to be familiar with this plan and supervisors have been instructed to share this plan with their staff.
It is important to note that our obligations under this plan extend to the information shared with and/or managed
by our vendors. Therefore, it is our policy to monitor and review what third party vendors have our information
and how we and/or they will respond to an incident occurring in their operations.
Confidential
Not for Disclosure Without
Written Permission
—2—
risk management practice guide of lawyers mutual
Considering the size of our Company, we have set forth the following procedures in our Security Plan and at the
direction of management responsible for overseeing its development, we have created an incident response team
or have appointed a Company individual that is assigned with the duties to implement, review, test, and modify
the incident response plan, as appropriate.
While developing our team, we have considered the size of our organization, available staff, staff expertise, bud-
get resources and exposures to incidents. Where we have determined that we lack any specific expertise or other
internal resources that are needed to carry out team assignments, we have considered the value of and made
preparations for using third party experts. It is our policy and goal to be prepared for and competently respond to
an incident.
The team’s roles and responsibilities are communicated to all Company staff. Similar communication is provided
if, and when, there are changes to the team, or its roles and responsibilities.
In order to measure the effectiveness of the team, it is our policy to evaluate the team’s performance and pre-
paredness, at least annually. While our evaluation may be conducted by management, staff, outside experts, and/
or by the team’s self assessment, the evaluation will consider the following:
• Benchmarking or comparing to other Incident Response Teams
• General discussions with management, team members and staff
• Surveys dispersed to management, team members and staff
• An audit by a third party knowledgeable in incident response plans, policies and procedures and actual inci-
dents
Additional information that may be made available during the evaluation process may include:
• Number of reported incidents
• Response time
• Number of incidents successfully resolved
• Information or updates that have been supplied to the organization
• Whether or not security issues remain within the organization and what they are
• Preventive measures or practices in place, are being implemented, or pending further review
In an effort to maintain awareness of the incident response plan and its team, it is our policy to distribute the
following team member contact sheet to all staff and to post the contact sheet in a convenient and conspicuous
location.
Confidential
Not for Disclosure Without
Written Permission
—3—
sample incident response plan
Date:
Confidential
Not for Disclosure Without
Written Permission
—4—
risk management practice guide of lawyers mutual
In the event an incident is suspected, is actually occurring, or has actually occurred, it is our policy to have the
staff member that becomes aware of the circumstance to report the event as an incident to their immediate super-
visor. In the event a staff member is unable to communicate with their supervisor, contact is to be escalated to any
one of the Incident Response Team Members, as identified in the Incident Response Contact Sheet.
Incident
Any perceived, actual, or successful attempt to gain unauthorized access to or use of customer/employee
information that could result in substantial harm or serious inconvenience to a customer.
(Incidents may arise out of or include breach of data confidentiality, stolen computer, laptop, PDA, or storage
device, data modification / destruction, unauthorized use of data, computers or changes to computers and
any attempts of the above, a computer virus, computer spyware, burglary, pre-text calls, and more. Incidents
may also be detected based on anomalies in information, unusual behavior by customers or staff, and notifi-
cation by a customer, vendor, or law enforcement, etc.)
Customer/Employee Information:
Any record containing nonpublic personal information about a customer/employee, whether in paper, elec-
tronic, or other form, maintained by or on behalf of the Company.
Name, address, or telephone number, social security number, financial institution account numbers, a per-
sonal identification number or password that would permit access to the customer’s or employee’s account.
Sensitive customer’s and employee’s information also includes any combination of components of customer’s
and employee’s information that would allow someone to log onto or access the customer’s and employee’s
account, such as a user name and password or password and account number.
Following the detection of an actual or perceived incident, staff is instructed to complete the following Incident
Response Discovery Form and forward it to their supervisor or an incident response team member, as appropriate.
Confidential
Not for Disclosure Without
Written Permission
—5—
sample incident response plan
Date:___________________________________
Time:___________________________________
Your Name:_____________________________
Dept:___________________________________
Phone:__________________________________
Date Discovered:_________________________
Time Discovered:_________________________
Who Discovered:________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
Confidential
Not for Disclosure Without
Written Permission
—6—
risk management practice guide of lawyers mutual
The internal and external environment of our Company is subject to constant change. Therefore, it is our policy to
assess each incident based on its own unique merits and characteristics.
Following the incident assessment, team members will create an incident response strategy and will carry out
duties to execute the incident response strategy according to established and/or new policies and procedures. For
illustration and reference purposes only, the following flow chart is provided.
Confidential
Not for Disclosure Without
Written Permission
—7—
sample incident response plan
Sample Only
Notification Requirements
1. Customers/Employees
2. Law Enforcement
3. Insurance
Post Incident Evaluation
Assess Damage/Cost
Assess Performance
Update/Modify Program
Confidential
Not for Disclosure Without
Confidential
Written Permission
Not for Disclosure Without
Written Permission
—8—
risk management practice guide of lawyers mutual
notification
As a business subject to regulations and laws, and as a business that emphasizes the value of customer/employee
trust and loyalty, it is our policy to notify the following parties in the event of an incident.
We are given a reasonable time to investigate. A determination will need to be made regarding the likelihood
that information has been or will be misused or is reasonably possible to be misused. While notice to customers/
employees may also be delayed if law enforcement is involved in an investigation and if such notice will interfere
with the investigation, it is our policy to provide notice to customers/employees as soon as notification will no
longer interfere with such investigation.
During our investigation of an incident, we will need to determine which customer/employee information has been
improperly accessed, if any. In the event we are able to determine that a group of files has been improperly accessed,
but are unable to identify which specific customer/employee information has been accessed, notification will be made
to all customers/employees in the group if we determine that misuse of the information is reasonably possible.
• What the Company has done to protect the information from further unauthorized access or use
• A telephone number the customers/employees may call for further information and assistance
• A reminder that customers/employees should remain vigilant over the next twelve to twenty-four months and to
promptly report incidents of suspected identity theft to their financial institution(s) and law enforcement
• Recommendations that the customer/employee review account statements and report suspicious activity
• A description of credit bureau fraud alerts and how they may be obtained
• Recommendations that the customer/employee periodically obtain credit reports and have information relat-
ing to fraudulent transactions deleted from their records
• An explanation of how to obtain credit reports free of charge
• Information about the Federal Trade Commission’s website, phone number, and online identity theft resources
and guidance on preventing identity theft
• Other customer/employee remedies provided by the (Company) at no cost to the member
Customer/employee notice will be delivered in a manner designed to ensure that a customer/employee can rea-
sonably be expected to receive it, either by phone, letter, email, or similar communication.
Confidential
Not for Disclosure Without
Written Permission
—9—
sample incident response plan
Sample Only
The following notification letter illustrates content that we may include in a response.
------------------------------------------------------------------------------------------------------------------
Date
We are writing to let you know that as a result of the recent data breach and attempt to misappropriate your per-
sonal information, (Company’s Name) is taking steps to help protect your identity.
The personal data that was potentially exposed includes your name, address, telephone number, account number,
social security number …….
Although we have no indication that your personal information has been abused, we take the protection of your
account information and your identity very seriously. Therefore, we are implementing the following precautionary
measures to protect you.
Confidential
Not for Disclosure Without
Written Permission
— 10 —
risk management practice guide of lawyers mutual
• $25,000 of identity insurance ($0 deductible) to cover certain expenses you may incur as a result of identity
theft.
• Credit Report Monitoring, which will monitor your Experian credit file and send an email to you of any unusual
activity on your credit file. (Your enrollment is required)
• One free copy of your credit report
• Access to the IFI Members Section for additional benefits, including educational materials, newsletters, dis-
counts on additional products, and more
To enroll in the Credit Monitoring program, please call Identity Fraud, Inc. at 1-866-443-3728 between the hours
of 8:00 am to 5:00 pm, Monday through Friday, Pacific Standard Time.
As an additional precaution, you may want to consider taking the following step:
• You may want to place a FREE 90-day initial Security Alert on your credit bureau file.The Security Alert, which
can be requested only by you, provides another significant layer of protection by flagging your credit file for
additional scrutiny by potential lenders. If you choose to activate a Security Alert, you need to successfully
activate the alert with only ONE of the three main credit reporting agencies listed below. The agency you
report to will automatically notify the other two agencies, as required by law. Their contact information is:
(Company’s Name) is committed to protecting the confidentiality of our customer/employee personal information.
While we regret any concern or inconvenience the recent incident may cause you, both Identity Fraud, Inc. and
(Company’s Name) believe the above items will help protect you from potential identity theft, no matter what type
or how it may occur.
Sincerely,
First Name Last Name
President and CEO
Confidential
Not for Disclosure Without
Written Permission
— 11 —
sample incident response plan
Documentation
Documentation of an actual or perceived incident will include but not be limited to information relating to the
person(s) that discovered the incident, suspect(s), incident assessment, strategic response, hard copy evidence,
electronic evidence (computer logs, emails, telephone recordings, etc.) meeting notes, damage, and costs.
Prior to an incident occurring and during and after an incident occurs, attempts will be made to quantify the
potential damage to the Company and the associated costs to contain and remedy the incident.
Insurance
Insurance coverage may or may not apply to incidents. Therefore, we will conduct a review to better determine
when insurance may or may not apply to various incidents and whether or not insurance applies to any specific
incident that is occurring. We will consult our professional insurance advisor/broker and/or company, as
necessary.
End of Document
Confidential
Not for Disclosure Without
Written Permission
— 12 —