SlideShare a Scribd company logo
What to do After a Data Breach
Posted on 09/14/2015
A data breach is a traumatizing event, regardless of how it occurs, and this has been a particularly active summer for thieves and
scammers.
In the past 12 months, Oregon lawyers have reported home and office break-ins, stolen laptops and mobile devices, and malware
security intrusions. If you experience a data breach, here are the key steps you must take:
1. Contact an IT expert NOW before you pass go. The scope of the intrusion may reach beyond your stolen mobile
device or the specifically infected computer. Until you know better, assume that all connected devices are part of the data
breach. This might include your desktop computer, your assistant’s computer, your server, mobile devices used to access
your network, and your home computer if you connect remotely to your office. Fixing security issues will require
sleuthing, finding a solution to the problem, protecting existing data and devices not affected by the breach, testing
security solutions, and potentially preserving forensic evidence. Don’t try to DIY!
2. Change vulnerable user names and passwords. At the first indication of a data breach, you won’t know exactly what
went wrong – only that your information, or your clients’ information, has been been compromised. With your IT
expert’s help, get access to a secure computer to change vulnerable user names and passwords. [If you modify your
login credentials while a keylogger resides on your system, you’ve made the situation worse by supplying the hacker
with your newly replaced user names and passwords.]
3. File a police report. Realistically, this isn’t likely to help. However, it may be required under the Oregon Consumer
Identity Theft Protection Act [ORS 646A.600- 646A.628] or the terms of your insurance/coverage policy.
4. Report the breach to your property manager. If the breach occurred in connection with an office break-in, inform the
property manager as soon as possible. Broken windows and locks should be fixed immediately to avoid further loss. If
you believe inadequate security may have played a role in the break-in, it may be appropriate to assert a claim against the
management or building owner. Research the issue or speak to outside counsel. Document your property loss and
consider getting a commitment in writing about security improvements.
5. File claims with commercial carriers. Submit claims to any applicable insurance carriers: cyber liability and data
breach, commercial liability, or others.
6. Contact the Professional Liability Fund. If you are an Oregon lawyer, contact the PLF. Beginning in 2013, the PLF
added a Data Breach and Cyber Liability Endorsement to all excess coverage plans. The endorsement provides coverage
for information security and privacy liability, privacy breach response services, regulatory defense and penalties, website
media content liability, and crisis management and public relations services. The endorsement covers many claims that
would otherwise be excluded.
7. Contact the Oregon State Bar. The OSB General Counsel’s office can give you advice about the ethical implications
of a data breach.
8. Report identity theft to the FTC. If you are the victim of identity theft, file a report with the FTC as soon as possible.
Review the FTC website for other steps not discussed here [reporting a misused social security number, removing bogus
credit charges, replacing government-issued identification cards].
9. Freeze or place fraud alerts on credit accounts. A freeze literally locks down your credit. No credit transactions
can be authorized until you lift the freeze, temporarily or permanently. Fraud alerts inform you if someone is attempting
to obtain newcredit in your name. Learn more about credit freezes and alerts here.
10. Protect bank accounts, credit cards, and debit cards. If banking, credit card, or debit card information was exposed
in conjunction with the data breach, you may want to freeze your bank accounts [personal, general, IOLTA]; arrange
for fraud protection services; or close your accounts altogether. Talk to your banks and credit/debit card providers. If
you have automated payments tied to former bank accounts, credit or debit cards, be sure to update your information.
This includes payment accounts associated with federal or state court eFiling systems. Continue to monitor statements
for unauthorized transactions.
11. Notify clients. This is never easy, but clients must be informed if confidential information has been compromised. A
sample notification letter is available on thePLF website. Select Practice Management > Forms > Client Relations >
“Notice to Clients re Theft of Computer Equipment.” If you have questions about your ethical duties toward clients,
speak to OSB General Counsel [see step 7 above]. Additionally, client notification may be a statutory
responsibility under the Oregon Consumer Identity Theft Protection Act [ORS 646A.600-646A.628].
12. Begin reconstructing files if needed. Lawyers who are straightforward about an office break-in or theft often find that
clients are sympathetic, understanding, and more than willing to help. With a bit of luck, you should be able to
reconstruct most or all of your files from your backup or documents supplied by clients.
13. Monitor your credit report. Check your credit reports at annualcreditreport.comfor signs of fraud.
Annualcreditreport.com is the only official source for free credit reports authorized by the Federal Trade Commission.
14. Monitor Craigslist. If you believe a thief has posted your property for sale, inform police.
15. Start using encryption. Read “Encryption Made Simple for Lawyers” as a starter, then check out these resources from
the ABA Legal Technology Resource Center. For reviews of encryption products, check out LawSites. [In the
navigation pane on the right, scroll midway down the page to Search LawSites.] If you want anencrypted password
manager – a very good idea – see these top picks for 2015. Shopping for a new laptop? Don’t forget that hard drive
encryption is automatically built into the MacBook. Using Windows OS? Sorry, you’ll need to buy your own encryption
software. If all this seems overwhelming, talk to your IT expert.
16. Backup, backup, backup! Online backup services are a great way to automatically back up data. Read more about
backup protocols and available resources on thePLF website. Select Practice Management > Forms > Technology >
“How to Backup Your Computer” and “Online Data Storage.”
17. No cyber liability or data breach coverage? Buy it! If your claims weren’t covered, purchase cyber liability and data
breach insurance to protect against future loss – privately or through the PLF as part of our excess program. [See item 6
above.]
18. Stay vigilant. Fixing a data breach does not mean that scammers or hackers will stop. Watch out for phishing attempts.
Don’t click on suspicious links in emails, texts, or social media messages. I’ve written over 20 blog posts on the subject
of scams. To find the posts, visit my blog’s landing page. In the search box in the upper right corner, enter “scam.”
You’ll also find seven In Brief articles on the PLF website. Select Practice Management > Publications > In Brief and
enter “scam” in the search by keyword or year box. See also Jennifer Meisberger, “Sophisticated Scams: Protect Your
Clients’ Money,” Oregon State Bar Bulletin (June 2015) and the PLF CLE, Protecting Your Firm and Your Client from
Scams, Fraud, and Financial Loss.
All Rights Reserved [2015] Beverly Michaelis

More Related Content

What's hot

Government Notification of Data Breach
Government Notification of Data BreachGovernment Notification of Data Breach
Government Notification of Data Breach
Shawn Tuma
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Sharing Slides Training
 
Identity theft pp presentation
Identity theft pp presentationIdentity theft pp presentation
Identity theft pp presentation
Yusuf Qadir
 
Cyber Facts and Prevention Presentation Gianino
Cyber Facts and Prevention Presentation GianinoCyber Facts and Prevention Presentation Gianino
Cyber Facts and Prevention Presentation Gianino
-Gianino Gino Prieto -Dynamic Connector -Insurance Strategist
 
E commerce - Data Integrity and Security
E commerce - Data Integrity and SecurityE commerce - Data Integrity and Security
E commerce - Data Integrity and Security
Jamie Hutt
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to Know
Act-On Software
 
Cloud Privacy
Cloud PrivacyCloud Privacy
Cloud Privacy
Act-On Software
 
Identity theft
Identity theftIdentity theft
Identity theft
SARASWATHI S
 
Hedna pii is your goldmine a landmine
Hedna   pii is your goldmine a landmineHedna   pii is your goldmine a landmine
Hedna pii is your goldmine a landmine
Evelyne Oreskovich
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
Don Grauel
 
Target data breach case study
Target data breach case studyTarget data breach case study
Target data breach case study
Abhilash vijayan
 
MA Privacy Law
MA Privacy LawMA Privacy Law
MA Privacy Law
travismd
 
Identity Theft
Identity Theft Identity Theft
Identity Theft
Fairfax County
 
When Data Loss Is An Inside Job
When Data Loss Is An Inside JobWhen Data Loss Is An Inside Job
When Data Loss Is An Inside Job
IDT911
 
Data Breach Detection: Are you ready for GDPR?
Data Breach Detection: Are you ready for GDPR?Data Breach Detection: Are you ready for GDPR?
Data Breach Detection: Are you ready for GDPR?
Digital Transformation EXPO Event Series
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Christina Gagnier
 
Data Breach White Paper
Data Breach White PaperData Breach White Paper
Data Breach White Paper
spencerharry
 
Identity theft
Identity theftIdentity theft
Identity theft
Nick Chandi
 
Equifax data breach
Equifax data breachEquifax data breach
Equifax data breach
Sajib Sen
 
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
Robert Craig
 

What's hot (20)

Government Notification of Data Breach
Government Notification of Data BreachGovernment Notification of Data Breach
Government Notification of Data Breach
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
 
Identity theft pp presentation
Identity theft pp presentationIdentity theft pp presentation
Identity theft pp presentation
 
Cyber Facts and Prevention Presentation Gianino
Cyber Facts and Prevention Presentation GianinoCyber Facts and Prevention Presentation Gianino
Cyber Facts and Prevention Presentation Gianino
 
E commerce - Data Integrity and Security
E commerce - Data Integrity and SecurityE commerce - Data Integrity and Security
E commerce - Data Integrity and Security
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to Know
 
Cloud Privacy
Cloud PrivacyCloud Privacy
Cloud Privacy
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Hedna pii is your goldmine a landmine
Hedna   pii is your goldmine a landmineHedna   pii is your goldmine a landmine
Hedna pii is your goldmine a landmine
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
 
Target data breach case study
Target data breach case studyTarget data breach case study
Target data breach case study
 
MA Privacy Law
MA Privacy LawMA Privacy Law
MA Privacy Law
 
Identity Theft
Identity Theft Identity Theft
Identity Theft
 
When Data Loss Is An Inside Job
When Data Loss Is An Inside JobWhen Data Loss Is An Inside Job
When Data Loss Is An Inside Job
 
Data Breach Detection: Are you ready for GDPR?
Data Breach Detection: Are you ready for GDPR?Data Breach Detection: Are you ready for GDPR?
Data Breach Detection: Are you ready for GDPR?
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
 
Data Breach White Paper
Data Breach White PaperData Breach White Paper
Data Breach White Paper
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Equifax data breach
Equifax data breachEquifax data breach
Equifax data breach
 
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
 

Viewers also liked

Retrieving attorney court calendars and case information online
Retrieving attorney court calendars and case information onlineRetrieving attorney court calendars and case information online
Retrieving attorney court calendars and case information online
Oregon Law Practice Management
 
Adventure Based Team Building Brochure
Adventure Based Team Building BrochureAdventure Based Team Building Brochure
Adventure Based Team Building Brochure
Carly Thorne
 
Web Sites From the 2009 ABA TECHSHOW
Web Sites From the 2009 ABA TECHSHOWWeb Sites From the 2009 ABA TECHSHOW
Web Sites From the 2009 ABA TECHSHOW
Oregon Law Practice Management
 
Confidentiality: A Responsibility of Legal Staff
Confidentiality: A Responsibility of Legal StaffConfidentiality: A Responsibility of Legal Staff
Confidentiality: A Responsibility of Legal Staff
Oregon Law Practice Management
 
Beware of These Traps in E-Filing and E-Notices
Beware of These Traps in E-Filing and E-NoticesBeware of These Traps in E-Filing and E-Notices
Beware of These Traps in E-Filing and E-Notices
Oregon Law Practice Management
 
Gc0594 employment fact sheet final a_screen
Gc0594 employment fact sheet final a_screenGc0594 employment fact sheet final a_screen
Gc0594 employment fact sheet final a_screen
Stephanie Bonnet
 
Content is King - Matthew Smith, VP IDG Connect, Europe, Jeremy Bevan, Vice P...
Content is King - Matthew Smith, VP IDG Connect, Europe, Jeremy Bevan, Vice P...Content is King - Matthew Smith, VP IDG Connect, Europe, Jeremy Bevan, Vice P...
Content is King - Matthew Smith, VP IDG Connect, Europe, Jeremy Bevan, Vice P...
Demand Generation Summit
 
December 2015 single read
December 2015 single readDecember 2015 single read
December 2015 single read
Paul Vincent
 
Understanding the New Filing Fee Requirements in Civil Cases (HB 2287)
Understanding the New Filing Fee Requirements in Civil Cases (HB 2287)Understanding the New Filing Fee Requirements in Civil Cases (HB 2287)
Understanding the New Filing Fee Requirements in Civil Cases (HB 2287)
Oregon Law Practice Management
 
CSN09112: Introduction to Computer Security
CSN09112: Introduction to Computer SecurityCSN09112: Introduction to Computer Security
CSN09112: Introduction to Computer Security
Napier University
 
Personal learning networks
Personal learning networksPersonal learning networks
Personal learning networks
TAFENSW Online
 
Cheatsheet
CheatsheetCheatsheet
Cheatsheet
bvaz
 
Master Your Personal Brand to Advance Your Career
Master Your Personal Brand to Advance Your CareerMaster Your Personal Brand to Advance Your Career
Master Your Personal Brand to Advance Your Career
LinkedIn Talent Solutions
 
Starbucks Brand Audit
Starbucks Brand AuditStarbucks Brand Audit
Starbucks Brand Audit
Laura Terry
 

Viewers also liked (14)

Retrieving attorney court calendars and case information online
Retrieving attorney court calendars and case information onlineRetrieving attorney court calendars and case information online
Retrieving attorney court calendars and case information online
 
Adventure Based Team Building Brochure
Adventure Based Team Building BrochureAdventure Based Team Building Brochure
Adventure Based Team Building Brochure
 
Web Sites From the 2009 ABA TECHSHOW
Web Sites From the 2009 ABA TECHSHOWWeb Sites From the 2009 ABA TECHSHOW
Web Sites From the 2009 ABA TECHSHOW
 
Confidentiality: A Responsibility of Legal Staff
Confidentiality: A Responsibility of Legal StaffConfidentiality: A Responsibility of Legal Staff
Confidentiality: A Responsibility of Legal Staff
 
Beware of These Traps in E-Filing and E-Notices
Beware of These Traps in E-Filing and E-NoticesBeware of These Traps in E-Filing and E-Notices
Beware of These Traps in E-Filing and E-Notices
 
Gc0594 employment fact sheet final a_screen
Gc0594 employment fact sheet final a_screenGc0594 employment fact sheet final a_screen
Gc0594 employment fact sheet final a_screen
 
Content is King - Matthew Smith, VP IDG Connect, Europe, Jeremy Bevan, Vice P...
Content is King - Matthew Smith, VP IDG Connect, Europe, Jeremy Bevan, Vice P...Content is King - Matthew Smith, VP IDG Connect, Europe, Jeremy Bevan, Vice P...
Content is King - Matthew Smith, VP IDG Connect, Europe, Jeremy Bevan, Vice P...
 
December 2015 single read
December 2015 single readDecember 2015 single read
December 2015 single read
 
Understanding the New Filing Fee Requirements in Civil Cases (HB 2287)
Understanding the New Filing Fee Requirements in Civil Cases (HB 2287)Understanding the New Filing Fee Requirements in Civil Cases (HB 2287)
Understanding the New Filing Fee Requirements in Civil Cases (HB 2287)
 
CSN09112: Introduction to Computer Security
CSN09112: Introduction to Computer SecurityCSN09112: Introduction to Computer Security
CSN09112: Introduction to Computer Security
 
Personal learning networks
Personal learning networksPersonal learning networks
Personal learning networks
 
Cheatsheet
CheatsheetCheatsheet
Cheatsheet
 
Master Your Personal Brand to Advance Your Career
Master Your Personal Brand to Advance Your CareerMaster Your Personal Brand to Advance Your Career
Master Your Personal Brand to Advance Your Career
 
Starbucks Brand Audit
Starbucks Brand AuditStarbucks Brand Audit
Starbucks Brand Audit
 

Similar to What to do after a data breach

Ten Protective Steps to Address the Equifax Breach
Ten Protective Steps to Address the Equifax BreachTen Protective Steps to Address the Equifax Breach
Ten Protective Steps to Address the Equifax Breach
Daniel Michels
 
FTC Protecting Info A Guide For Business Powerpoint
FTC  Protecting  Info A  Guide  For  Business  PowerpointFTC  Protecting  Info A  Guide  For  Business  Powerpoint
FTC Protecting Info A Guide For Business Powerpoint
Bucacci Business Solutions
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take Next
Brian Pichman
 
Enterprise Ready for Amazon Web Services
Enterprise Ready for Amazon Web ServicesEnterprise Ready for Amazon Web Services
Enterprise Ready for Amazon Web Services
Richard Rendell
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber security
Helen Carpenter
 
Identity Theft Information for Businesses
Identity Theft Information for BusinessesIdentity Theft Information for Businesses
Identity Theft Information for Businesses
Tri-State Better Business Bureau
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jackson
aiimnevada
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business
- Mark - Fullbright
 
How to Effectively Manage a Data Breach
How to Effectively Manage a Data Breach How to Effectively Manage a Data Breach
How to Effectively Manage a Data Breach
SecurityMetrics
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
- Mark - Fullbright
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6
seadeloitte
 
Canadian Consumer Handbook
Canadian Consumer HandbookCanadian Consumer Handbook
Canadian Consumer Handbook
- Mark - Fullbright
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
Meg Weber
 
Freeze Your Credit File
Freeze Your Credit FileFreeze Your Credit File
Freeze Your Credit File
- Mark - Fullbright
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools Tactics
Ben Graybar
 
How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...
Security B-Sides
 
Cyber Liability Risk
Cyber Liability RiskCyber Liability Risk
Cyber Liability Risk
Christopher Rieser
 
Data Breach Response: Before and After the Breach (Series: Cybersecurity & Da...
Data Breach Response: Before and After the Breach (Series: Cybersecurity & Da...Data Breach Response: Before and After the Breach (Series: Cybersecurity & Da...
Data Breach Response: Before and After the Breach (Series: Cybersecurity & Da...
Financial Poise
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
Alan Greggo
 
5 Tips How To Stay Secure During Tax Season 2018
5 Tips How To Stay Secure During Tax Season 20185 Tips How To Stay Secure During Tax Season 2018
5 Tips How To Stay Secure During Tax Season 2018
Deepanshu Gahlaut
 

Similar to What to do after a data breach (20)

Ten Protective Steps to Address the Equifax Breach
Ten Protective Steps to Address the Equifax BreachTen Protective Steps to Address the Equifax Breach
Ten Protective Steps to Address the Equifax Breach
 
FTC Protecting Info A Guide For Business Powerpoint
FTC  Protecting  Info A  Guide  For  Business  PowerpointFTC  Protecting  Info A  Guide  For  Business  Powerpoint
FTC Protecting Info A Guide For Business Powerpoint
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take Next
 
Enterprise Ready for Amazon Web Services
Enterprise Ready for Amazon Web ServicesEnterprise Ready for Amazon Web Services
Enterprise Ready for Amazon Web Services
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber security
 
Identity Theft Information for Businesses
Identity Theft Information for BusinessesIdentity Theft Information for Businesses
Identity Theft Information for Businesses
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jackson
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business
 
How to Effectively Manage a Data Breach
How to Effectively Manage a Data Breach How to Effectively Manage a Data Breach
How to Effectively Manage a Data Breach
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6
 
Canadian Consumer Handbook
Canadian Consumer HandbookCanadian Consumer Handbook
Canadian Consumer Handbook
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
Freeze Your Credit File
Freeze Your Credit FileFreeze Your Credit File
Freeze Your Credit File
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools Tactics
 
How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...
 
Cyber Liability Risk
Cyber Liability RiskCyber Liability Risk
Cyber Liability Risk
 
Data Breach Response: Before and After the Breach (Series: Cybersecurity & Da...
Data Breach Response: Before and After the Breach (Series: Cybersecurity & Da...Data Breach Response: Before and After the Breach (Series: Cybersecurity & Da...
Data Breach Response: Before and After the Breach (Series: Cybersecurity & Da...
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
5 Tips How To Stay Secure During Tax Season 2018
5 Tips How To Stay Secure During Tax Season 20185 Tips How To Stay Secure During Tax Season 2018
5 Tips How To Stay Secure During Tax Season 2018
 

More from Oregon Law Practice Management

Protecting your iolta and operating accounts
Protecting your iolta and operating accountsProtecting your iolta and operating accounts
Protecting your iolta and operating accounts
Oregon Law Practice Management
 
OJD iForms - interactive court forms for the public
OJD iForms - interactive court forms for the publicOJD iForms - interactive court forms for the public
OJD iForms - interactive court forms for the public
Oregon Law Practice Management
 
The continuum of client communication
The continuum of client communicationThe continuum of client communication
The continuum of client communication
Oregon Law Practice Management
 
Scams will never stop
Scams will never stopScams will never stop
Scams will never stop
Oregon Law Practice Management
 
7 steps you can take now to protect your data
7 steps you can take now to protect your data7 steps you can take now to protect your data
7 steps you can take now to protect your data
Oregon Law Practice Management
 
A bright future for new lawyers
A bright future for new lawyersA bright future for new lawyers
A bright future for new lawyers
Oregon Law Practice Management
 
Do lawyers have an ethical duty to replace hacked funds?
Do lawyers have an ethical duty to replace hacked funds?Do lawyers have an ethical duty to replace hacked funds?
Do lawyers have an ethical duty to replace hacked funds?
Oregon Law Practice Management
 
Formatting legal documents with Microsoft Word 2016
Formatting legal documents with Microsoft Word 2016Formatting legal documents with Microsoft Word 2016
Formatting legal documents with Microsoft Word 2016
Oregon Law Practice Management
 
UTCR amendments 2016
UTCR amendments 2016UTCR amendments 2016
UTCR amendments 2016
Oregon Law Practice Management
 
eCourt malpractice traps and relation back
eCourt malpractice traps and relation backeCourt malpractice traps and relation back
eCourt malpractice traps and relation back
Oregon Law Practice Management
 
Marketing and client development in three easy steps
Marketing and client development in three easy stepsMarketing and client development in three easy steps
Marketing and client development in three easy steps
Oregon Law Practice Management
 
The 7 golden rules of collections
The 7 golden rules of collectionsThe 7 golden rules of collections
The 7 golden rules of collections
Oregon Law Practice Management
 
Bankruptcy for the non bankruptcy lawyer
Bankruptcy for the non bankruptcy lawyerBankruptcy for the non bankruptcy lawyer
Bankruptcy for the non bankruptcy lawyer
Oregon Law Practice Management
 
Oregon ecourt and arbitration
Oregon ecourt and arbitrationOregon ecourt and arbitration
Oregon ecourt and arbitration
Oregon Law Practice Management
 
The year in review - top posts of 2015
The year in review - top posts of 2015The year in review - top posts of 2015
The year in review - top posts of 2015
Oregon Law Practice Management
 
Glitches in oregon e service
Glitches in oregon e serviceGlitches in oregon e service
Glitches in oregon e service
Oregon Law Practice Management
 
Editing scanned pdfs in acrobat xi or dc
Editing scanned pdfs in acrobat xi or dcEditing scanned pdfs in acrobat xi or dc
Editing scanned pdfs in acrobat xi or dc
Oregon Law Practice Management
 
How to name client folders
How to name client foldersHow to name client folders
How to name client folders
Oregon Law Practice Management
 
Redaction tool in Acrobat XI
Redaction tool in Acrobat XIRedaction tool in Acrobat XI
Redaction tool in Acrobat XI
Oregon Law Practice Management
 
60 apps in 60 minutes
60 apps in 60 minutes60 apps in 60 minutes
60 apps in 60 minutes
Oregon Law Practice Management
 

More from Oregon Law Practice Management (20)

Protecting your iolta and operating accounts
Protecting your iolta and operating accountsProtecting your iolta and operating accounts
Protecting your iolta and operating accounts
 
OJD iForms - interactive court forms for the public
OJD iForms - interactive court forms for the publicOJD iForms - interactive court forms for the public
OJD iForms - interactive court forms for the public
 
The continuum of client communication
The continuum of client communicationThe continuum of client communication
The continuum of client communication
 
Scams will never stop
Scams will never stopScams will never stop
Scams will never stop
 
7 steps you can take now to protect your data
7 steps you can take now to protect your data7 steps you can take now to protect your data
7 steps you can take now to protect your data
 
A bright future for new lawyers
A bright future for new lawyersA bright future for new lawyers
A bright future for new lawyers
 
Do lawyers have an ethical duty to replace hacked funds?
Do lawyers have an ethical duty to replace hacked funds?Do lawyers have an ethical duty to replace hacked funds?
Do lawyers have an ethical duty to replace hacked funds?
 
Formatting legal documents with Microsoft Word 2016
Formatting legal documents with Microsoft Word 2016Formatting legal documents with Microsoft Word 2016
Formatting legal documents with Microsoft Word 2016
 
UTCR amendments 2016
UTCR amendments 2016UTCR amendments 2016
UTCR amendments 2016
 
eCourt malpractice traps and relation back
eCourt malpractice traps and relation backeCourt malpractice traps and relation back
eCourt malpractice traps and relation back
 
Marketing and client development in three easy steps
Marketing and client development in three easy stepsMarketing and client development in three easy steps
Marketing and client development in three easy steps
 
The 7 golden rules of collections
The 7 golden rules of collectionsThe 7 golden rules of collections
The 7 golden rules of collections
 
Bankruptcy for the non bankruptcy lawyer
Bankruptcy for the non bankruptcy lawyerBankruptcy for the non bankruptcy lawyer
Bankruptcy for the non bankruptcy lawyer
 
Oregon ecourt and arbitration
Oregon ecourt and arbitrationOregon ecourt and arbitration
Oregon ecourt and arbitration
 
The year in review - top posts of 2015
The year in review - top posts of 2015The year in review - top posts of 2015
The year in review - top posts of 2015
 
Glitches in oregon e service
Glitches in oregon e serviceGlitches in oregon e service
Glitches in oregon e service
 
Editing scanned pdfs in acrobat xi or dc
Editing scanned pdfs in acrobat xi or dcEditing scanned pdfs in acrobat xi or dc
Editing scanned pdfs in acrobat xi or dc
 
How to name client folders
How to name client foldersHow to name client folders
How to name client folders
 
Redaction tool in Acrobat XI
Redaction tool in Acrobat XIRedaction tool in Acrobat XI
Redaction tool in Acrobat XI
 
60 apps in 60 minutes
60 apps in 60 minutes60 apps in 60 minutes
60 apps in 60 minutes
 

Recently uploaded

原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
osenwakm
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
HarpreetSaini48
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
MattGardner52
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
BridgeWest.eu
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
ssuser559494
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
veteranlegal
 
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
15e6o6u
 
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
MasoudZamani13
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
seri bangash
 
From Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal EnvironmentsFrom Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal Environments
ssusera97a2f
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
gjsma0ep
 
PPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx llPPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx ll
MohammadZubair874462
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Massimo Talia
 
What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...
lawyersonia
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
sunitasaha5
 
Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
RichardTheberge
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
SKshi
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
osenwakm
 

Recently uploaded (20)

原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
 
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
 
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
 
From Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal EnvironmentsFrom Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal Environments
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
 
PPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx llPPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx ll
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
 
What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
 
Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
 

What to do after a data breach

  • 1. What to do After a Data Breach Posted on 09/14/2015 A data breach is a traumatizing event, regardless of how it occurs, and this has been a particularly active summer for thieves and scammers. In the past 12 months, Oregon lawyers have reported home and office break-ins, stolen laptops and mobile devices, and malware security intrusions. If you experience a data breach, here are the key steps you must take: 1. Contact an IT expert NOW before you pass go. The scope of the intrusion may reach beyond your stolen mobile device or the specifically infected computer. Until you know better, assume that all connected devices are part of the data breach. This might include your desktop computer, your assistant’s computer, your server, mobile devices used to access your network, and your home computer if you connect remotely to your office. Fixing security issues will require sleuthing, finding a solution to the problem, protecting existing data and devices not affected by the breach, testing security solutions, and potentially preserving forensic evidence. Don’t try to DIY! 2. Change vulnerable user names and passwords. At the first indication of a data breach, you won’t know exactly what went wrong – only that your information, or your clients’ information, has been been compromised. With your IT expert’s help, get access to a secure computer to change vulnerable user names and passwords. [If you modify your login credentials while a keylogger resides on your system, you’ve made the situation worse by supplying the hacker with your newly replaced user names and passwords.] 3. File a police report. Realistically, this isn’t likely to help. However, it may be required under the Oregon Consumer Identity Theft Protection Act [ORS 646A.600- 646A.628] or the terms of your insurance/coverage policy. 4. Report the breach to your property manager. If the breach occurred in connection with an office break-in, inform the property manager as soon as possible. Broken windows and locks should be fixed immediately to avoid further loss. If you believe inadequate security may have played a role in the break-in, it may be appropriate to assert a claim against the management or building owner. Research the issue or speak to outside counsel. Document your property loss and consider getting a commitment in writing about security improvements. 5. File claims with commercial carriers. Submit claims to any applicable insurance carriers: cyber liability and data breach, commercial liability, or others. 6. Contact the Professional Liability Fund. If you are an Oregon lawyer, contact the PLF. Beginning in 2013, the PLF added a Data Breach and Cyber Liability Endorsement to all excess coverage plans. The endorsement provides coverage for information security and privacy liability, privacy breach response services, regulatory defense and penalties, website media content liability, and crisis management and public relations services. The endorsement covers many claims that would otherwise be excluded. 7. Contact the Oregon State Bar. The OSB General Counsel’s office can give you advice about the ethical implications of a data breach. 8. Report identity theft to the FTC. If you are the victim of identity theft, file a report with the FTC as soon as possible. Review the FTC website for other steps not discussed here [reporting a misused social security number, removing bogus credit charges, replacing government-issued identification cards]. 9. Freeze or place fraud alerts on credit accounts. A freeze literally locks down your credit. No credit transactions can be authorized until you lift the freeze, temporarily or permanently. Fraud alerts inform you if someone is attempting to obtain newcredit in your name. Learn more about credit freezes and alerts here.
  • 2. 10. Protect bank accounts, credit cards, and debit cards. If banking, credit card, or debit card information was exposed in conjunction with the data breach, you may want to freeze your bank accounts [personal, general, IOLTA]; arrange for fraud protection services; or close your accounts altogether. Talk to your banks and credit/debit card providers. If you have automated payments tied to former bank accounts, credit or debit cards, be sure to update your information. This includes payment accounts associated with federal or state court eFiling systems. Continue to monitor statements for unauthorized transactions. 11. Notify clients. This is never easy, but clients must be informed if confidential information has been compromised. A sample notification letter is available on thePLF website. Select Practice Management > Forms > Client Relations > “Notice to Clients re Theft of Computer Equipment.” If you have questions about your ethical duties toward clients, speak to OSB General Counsel [see step 7 above]. Additionally, client notification may be a statutory responsibility under the Oregon Consumer Identity Theft Protection Act [ORS 646A.600-646A.628]. 12. Begin reconstructing files if needed. Lawyers who are straightforward about an office break-in or theft often find that clients are sympathetic, understanding, and more than willing to help. With a bit of luck, you should be able to reconstruct most or all of your files from your backup or documents supplied by clients. 13. Monitor your credit report. Check your credit reports at annualcreditreport.comfor signs of fraud. Annualcreditreport.com is the only official source for free credit reports authorized by the Federal Trade Commission. 14. Monitor Craigslist. If you believe a thief has posted your property for sale, inform police. 15. Start using encryption. Read “Encryption Made Simple for Lawyers” as a starter, then check out these resources from the ABA Legal Technology Resource Center. For reviews of encryption products, check out LawSites. [In the navigation pane on the right, scroll midway down the page to Search LawSites.] If you want anencrypted password manager – a very good idea – see these top picks for 2015. Shopping for a new laptop? Don’t forget that hard drive encryption is automatically built into the MacBook. Using Windows OS? Sorry, you’ll need to buy your own encryption software. If all this seems overwhelming, talk to your IT expert. 16. Backup, backup, backup! Online backup services are a great way to automatically back up data. Read more about backup protocols and available resources on thePLF website. Select Practice Management > Forms > Technology > “How to Backup Your Computer” and “Online Data Storage.” 17. No cyber liability or data breach coverage? Buy it! If your claims weren’t covered, purchase cyber liability and data breach insurance to protect against future loss – privately or through the PLF as part of our excess program. [See item 6 above.] 18. Stay vigilant. Fixing a data breach does not mean that scammers or hackers will stop. Watch out for phishing attempts. Don’t click on suspicious links in emails, texts, or social media messages. I’ve written over 20 blog posts on the subject of scams. To find the posts, visit my blog’s landing page. In the search box in the upper right corner, enter “scam.” You’ll also find seven In Brief articles on the PLF website. Select Practice Management > Publications > In Brief and enter “scam” in the search by keyword or year box. See also Jennifer Meisberger, “Sophisticated Scams: Protect Your Clients’ Money,” Oregon State Bar Bulletin (June 2015) and the PLF CLE, Protecting Your Firm and Your Client from Scams, Fraud, and Financial Loss. All Rights Reserved [2015] Beverly Michaelis