The Secure GC: Ten Key Steps in Responding to a Data Breach

Read the full article (PDF) >

For many general counsel, a nightmare scenario might be waking up to a phone call alerting them that the organization’s data systems have been breached. Although receiving the call at least means the company’s response will extend beyond server administrators frantically applying patches to the system into the morning, it nonetheless puts the spotlight on counsel who is increasingly expected to drive an effective and comprehensive breach response. How can counsel feel secure that this response accounts for all of the technical, regulatory, and legal obstacles associated with a data breach? Following ten key steps may mean the difference between an easy resolution and a far greater headache down the road.

First published in InsideCounsel on December 24, 2015

The articles on our Website include some of the publications and papers authored by our attorneys, both before and after they joined our firm. The content of these articles should not be taken as legal advice.