February 3, 2017
The best way to handle any emergency is to be prepared. When it comes to data breaches, incident response plans are the first step organizations take to prepare.
In the United States, incident response plans are commonplace. Since 2005, the federal banking agencies have interpreted the Gramm-Leach-Bliley Act as requiring financial institutions to create procedures for handling data security incidents.1 Although there is no federal statute that requires the majority of other types of organizations to create an incident response plan, state data safeguards and data breach notification statutes provide incentives for many other organizations to craft response plans. For example, organizations that collect sensitive personal information about Massachusetts residents are required to “document responsive actions taken in connection with any incident involving a breach of security.”2 While the statute does not specifically require that an organization create a written incident response plans, such plans help organizations outline responsive steps that could be taken following an incident, and to create the documentation required by the statute. Incident response plans are also used to comply with the myriad of state data breach notification statutes that require organizations conduct an investigation in the event of a suspected data security breach. Finally, many organizations in the United States are contractually required to create and maintain a written incident response plan. For example, organizations that accept payment cards are typically required by their payment processors to adopt the Payment Card Industry Data Security Standard which, in turn, requires the organization to maintain a written incident response plan.
Like the United States, historically the European Union has only required, on a Union-wide basis, data breach notification in specific sectors like telecommunications.3 While some member states enacted broader notification legislation, by and large there was far less uniformity in the EU between, and among, member states than existed in the United States, and there were few, if any, explicit requirements that companies create – in advance of a breach – a plan for how to handle a data security incident.
The EU’s new General Data Protection Regulation (“GDPR”) includes, for the first time, a broad breach notification requirement. Under the GDPR, a “personal data breach” is defined broadly as “a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored or otherwise processed.”4 It will formally go into force in the spring of 2018. Although the GDPR does not explicitly require that organizations draft an “incident response plan,” organizations are likely to find that putting plans in place is essential in order to comply with the requirement of the GDPR that controllers notify supervisory authorities within 72 hours of becoming aware of a data breach, or that they make a determination that the breach is unlikely to pose a risk to the rights of individuals.5
A good incident response plan does not attempt to predict every type of breach that may occur. Rather the fundamental components of an incident response plan is that it establishes the framework for who within an organization is responsible for investigating a security incident, what resources that person has at their disposal (inside and outside of the organization), and when a situation should be elevated to others within the organization. They can also provide a reference guide for the type of actions common to most security investigations. The following provides a snapshot of information regarding incident response plans.