SlideShare a Scribd company logo
What to do After a Data Breach
Posted on 09/14/2015
A data breach is a traumatizing event, regardless of how it occurs, and this has been a particularly active summer for thieves and
scammers.
In the past 12 months, Oregon lawyers have reported home and office break-ins, stolen laptops and mobile devices, and malware
security intrusions. If you experience a data breach, here are the key steps you must take:
1. Contact an IT expert NOW before you pass go. The scope of the intrusion may reach beyond your stolen mobile
device or the specifically infected computer. Until you know better, assume that all connected devices are part of the data
breach. This might include your desktop computer, your assistant’s computer, your server, mobile devices used to access
your network, and your home computer if you connect remotely to your office. Fixing security issues will require
sleuthing, finding a solution to the problem, protecting existing data and devices not affected by the breach, testing
security solutions, and potentially preserving forensic evidence. Don’t try to DIY!
2. Change vulnerable user names and passwords. At the first indication of a data breach, you won’t know exactly what
went wrong – only that your information, or your clients’ information, has been been compromised. With your IT
expert’s help, get access to a secure computer to change vulnerable user names and passwords. [If you modify your
login credentials while a keylogger resides on your system, you’ve made the situation worse by supplying the hacker
with your newly replaced user names and passwords.]
3. File a police report. Realistically, this isn’t likely to help. However, it may be required under the Oregon Consumer
Identity Theft Protection Act [ORS 646A.600- 646A.628] or the terms of your insurance/coverage policy.
4. Report the breach to your property manager. If the breach occurred in connection with an office break-in, inform the
property manager as soon as possible. Broken windows and locks should be fixed immediately to avoid further loss. If
you believe inadequate security may have played a role in the break-in, it may be appropriate to assert a claim against the
management or building owner. Research the issue or speak to outside counsel. Document your property loss and
consider getting a commitment in writing about security improvements.
5. File claims with commercial carriers. Submit claims to any applicable insurance carriers: cyber liability and data
breach, commercial liability, or others.
6. Contact the Professional Liability Fund. If you are an Oregon lawyer, contact the PLF. Beginning in 2013, the PLF
added a Data Breach and Cyber Liability Endorsement to all excess coverage plans. The endorsement provides coverage
for information security and privacy liability, privacy breach response services, regulatory defense and penalties, website
media content liability, and crisis management and public relations services. The endorsement covers many claims that
would otherwise be excluded.
7. Contact the Oregon State Bar. The OSB General Counsel’s office can give you advice about the ethical implications
of a data breach.
8. Report identity theft to the FTC. If you are the victim of identity theft, file a report with the FTC as soon as possible.
Review the FTC website for other steps not discussed here [reporting a misused social security number, removing bogus
credit charges, replacing government-issued identification cards].
9. Freeze or place fraud alerts on credit accounts. A freeze literally locks down your credit. No credit transactions
can be authorized until you lift the freeze, temporarily or permanently. Fraud alerts inform you if someone is attempting
to obtain newcredit in your name. Learn more about credit freezes and alerts here.
10. Protect bank accounts, credit cards, and debit cards. If banking, credit card, or debit card information was exposed
in conjunction with the data breach, you may want to freeze your bank accounts [personal, general, IOLTA]; arrange
for fraud protection services; or close your accounts altogether. Talk to your banks and credit/debit card providers. If
you have automated payments tied to former bank accounts, credit or debit cards, be sure to update your information.
This includes payment accounts associated with federal or state court eFiling systems. Continue to monitor statements
for unauthorized transactions.
11. Notify clients. This is never easy, but clients must be informed if confidential information has been compromised. A
sample notification letter is available on thePLF website. Select Practice Management > Forms > Client Relations >
“Notice to Clients re Theft of Computer Equipment.” If you have questions about your ethical duties toward clients,
speak to OSB General Counsel [see step 7 above]. Additionally, client notification may be a statutory
responsibility under the Oregon Consumer Identity Theft Protection Act [ORS 646A.600-646A.628].
12. Begin reconstructing files if needed. Lawyers who are straightforward about an office break-in or theft often find that
clients are sympathetic, understanding, and more than willing to help. With a bit of luck, you should be able to
reconstruct most or all of your files from your backup or documents supplied by clients.
13. Monitor your credit report. Check your credit reports at annualcreditreport.comfor signs of fraud.
Annualcreditreport.com is the only official source for free credit reports authorized by the Federal Trade Commission.
14. Monitor Craigslist. If you believe a thief has posted your property for sale, inform police.
15. Start using encryption. Read “Encryption Made Simple for Lawyers” as a starter, then check out these resources from
the ABA Legal Technology Resource Center. For reviews of encryption products, check out LawSites. [In the
navigation pane on the right, scroll midway down the page to Search LawSites.] If you want anencrypted password
manager – a very good idea – see these top picks for 2015. Shopping for a new laptop? Don’t forget that hard drive
encryption is automatically built into the MacBook. Using Windows OS? Sorry, you’ll need to buy your own encryption
software. If all this seems overwhelming, talk to your IT expert.
16. Backup, backup, backup! Online backup services are a great way to automatically back up data. Read more about
backup protocols and available resources on thePLF website. Select Practice Management > Forms > Technology >
“How to Backup Your Computer” and “Online Data Storage.”
17. No cyber liability or data breach coverage? Buy it! If your claims weren’t covered, purchase cyber liability and data
breach insurance to protect against future loss – privately or through the PLF as part of our excess program. [See item 6
above.]
18. Stay vigilant. Fixing a data breach does not mean that scammers or hackers will stop. Watch out for phishing attempts.
Don’t click on suspicious links in emails, texts, or social media messages. I’ve written over 20 blog posts on the subject
of scams. To find the posts, visit my blog’s landing page. In the search box in the upper right corner, enter “scam.”
You’ll also find seven In Brief articles on the PLF website. Select Practice Management > Publications > In Brief and
enter “scam” in the search by keyword or year box. See also Jennifer Meisberger, “Sophisticated Scams: Protect Your
Clients’ Money,” Oregon State Bar Bulletin (June 2015) and the PLF CLE, Protecting Your Firm and Your Client from
Scams, Fraud, and Financial Loss.
All Rights Reserved [2015] Beverly Michaelis

More Related Content

PPTX
Computer Fraud and Abuse Act CLE - Dallas Bar Ass'n (8.22.11)
PPTX
Overview and Update on the Computer Fraud and Abuse Act (CFAA) for the Data ...
PDF
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
PPT
Website Compliance 2009
PPTX
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
PDF
Hacker Defense: How to Make Your Law Firm a Harder Target
PPTX
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
PDF
The Changing Landscape of Cyber Liability
Computer Fraud and Abuse Act CLE - Dallas Bar Ass'n (8.22.11)
Overview and Update on the Computer Fraud and Abuse Act (CFAA) for the Data ...
Protecting Your Law Office Against Data Breaches and Other Cyber Threats
Website Compliance 2009
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Hacker Defense: How to Make Your Law Firm a Harder Target
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
The Changing Landscape of Cyber Liability

What's hot (20)

PDF
Government Notification of Data Breach
PPT
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
PPTX
Identity theft pp presentation
PPT
Cyber Facts and Prevention Presentation Gianino
PPTX
E commerce - Data Integrity and Security
PPTX
Cloud Privacy Update: What You Need to Know
PDF
Cloud Privacy
PPTX
Identity theft
PDF
Hedna pii is your goldmine a landmine
PPT
George Gavras 2010 Fowler Seminar
PDF
Target data breach case study
PPT
MA Privacy Law
PPTX
Identity Theft
PPTX
When Data Loss Is An Inside Job
PDF
Data Breach Detection: Are you ready for GDPR?
KEY
Gagnier's Portion of TechWeek Chicago Presentation
PDF
Data Breach White Paper
PDF
Identity theft
PPTX
Equifax data breach
PPTX
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
Government Notification of Data Breach
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Identity theft pp presentation
Cyber Facts and Prevention Presentation Gianino
E commerce - Data Integrity and Security
Cloud Privacy Update: What You Need to Know
Cloud Privacy
Identity theft
Hedna pii is your goldmine a landmine
George Gavras 2010 Fowler Seminar
Target data breach case study
MA Privacy Law
Identity Theft
When Data Loss Is An Inside Job
Data Breach Detection: Are you ready for GDPR?
Gagnier's Portion of TechWeek Chicago Presentation
Data Breach White Paper
Identity theft
Equifax data breach
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
Ad

Viewers also liked (14)

PDF
Retrieving attorney court calendars and case information online
PDF
Adventure Based Team Building Brochure
PDF
Web Sites From the 2009 ABA TECHSHOW
PPT
Confidentiality: A Responsibility of Legal Staff
PDF
Beware of These Traps in E-Filing and E-Notices
PDF
Gc0594 employment fact sheet final a_screen
PPT
Content is King - Matthew Smith, VP IDG Connect, Europe, Jeremy Bevan, Vice P...
PDF
December 2015 single read
PDF
Understanding the New Filing Fee Requirements in Civil Cases (HB 2287)
PDF
CSN09112: Introduction to Computer Security
PPTX
Personal learning networks
PPT
Cheatsheet
PDF
Master Your Personal Brand to Advance Your Career
PPTX
Starbucks Brand Audit
Retrieving attorney court calendars and case information online
Adventure Based Team Building Brochure
Web Sites From the 2009 ABA TECHSHOW
Confidentiality: A Responsibility of Legal Staff
Beware of These Traps in E-Filing and E-Notices
Gc0594 employment fact sheet final a_screen
Content is King - Matthew Smith, VP IDG Connect, Europe, Jeremy Bevan, Vice P...
December 2015 single read
Understanding the New Filing Fee Requirements in Civil Cases (HB 2287)
CSN09112: Introduction to Computer Security
Personal learning networks
Cheatsheet
Master Your Personal Brand to Advance Your Career
Starbucks Brand Audit
Ad

Similar to What to do after a data breach (20)

PDF
Data Breach Response: A Guide for Business
PPTX
I’ve been hacked  the essential steps to take next
PDF
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
PPT
How-to-Respond-to-a-Data-Breach_-A-Comprehensive-Guide.ppt
PPTX
CCIAOR Cyber Security Forum
PDF
2017 Legal Seminar for Credit Professionals - Cleveland
PDF
2017 Legal Seminar for Credit Professionals - Columbus
PDF
Cyber Law & Forensics
PPTX
CyberSecurity - Computers In Libraries 2024
PPTX
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
PPTX
Captive Insurance and Cyber Risk
PPT
FTC Protecting Info A Guide For Business Powerpoint
PPTX
I’ve Been Hacked  The Essential Steps to Take Next
PDF
Webinar: Don’t Be a Victim to Cyber Liability Risks
PDF
2014-2015-data-breach-response-guide
PDF
Cyber Security For Law Firms - February 2015 -Westchester County Bar Associat...
PPT
Privacy and Data Security: Risk Management and Avoidance
PDF
How to Effectively Manage a Data Breach
PPT
Identity theft power_point
PDF
Data Breach Response: Before and After the Breach
Data Breach Response: A Guide for Business
I’ve been hacked  the essential steps to take next
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
How-to-Respond-to-a-Data-Breach_-A-Comprehensive-Guide.ppt
CCIAOR Cyber Security Forum
2017 Legal Seminar for Credit Professionals - Cleveland
2017 Legal Seminar for Credit Professionals - Columbus
Cyber Law & Forensics
CyberSecurity - Computers In Libraries 2024
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Captive Insurance and Cyber Risk
FTC Protecting Info A Guide For Business Powerpoint
I’ve Been Hacked  The Essential Steps to Take Next
Webinar: Don’t Be a Victim to Cyber Liability Risks
2014-2015-data-breach-response-guide
Cyber Security For Law Firms - February 2015 -Westchester County Bar Associat...
Privacy and Data Security: Risk Management and Avoidance
How to Effectively Manage a Data Breach
Identity theft power_point
Data Breach Response: Before and After the Breach

More from Oregon Law Practice Management (20)

DOCX
Protecting your iolta and operating accounts
DOCX
OJD iForms - interactive court forms for the public
DOCX
The continuum of client communication
DOCX
Scams will never stop
DOCX
7 steps you can take now to protect your data
DOCX
A bright future for new lawyers
DOCX
Do lawyers have an ethical duty to replace hacked funds?
DOCX
Formatting legal documents with Microsoft Word 2016
DOCX
UTCR amendments 2016
DOCX
eCourt malpractice traps and relation back
DOCX
Marketing and client development in three easy steps
DOCX
The 7 golden rules of collections
PDF
Bankruptcy for the non bankruptcy lawyer
PDF
Oregon ecourt and arbitration
PDF
The year in review - top posts of 2015
PDF
Glitches in oregon e service
PDF
Editing scanned pdfs in acrobat xi or dc
PDF
How to name client folders
PDF
Redaction tool in Acrobat XI
PDF
60 apps in 60 minutes
Protecting your iolta and operating accounts
OJD iForms - interactive court forms for the public
The continuum of client communication
Scams will never stop
7 steps you can take now to protect your data
A bright future for new lawyers
Do lawyers have an ethical duty to replace hacked funds?
Formatting legal documents with Microsoft Word 2016
UTCR amendments 2016
eCourt malpractice traps and relation back
Marketing and client development in three easy steps
The 7 golden rules of collections
Bankruptcy for the non bankruptcy lawyer
Oregon ecourt and arbitration
The year in review - top posts of 2015
Glitches in oregon e service
Editing scanned pdfs in acrobat xi or dc
How to name client folders
Redaction tool in Acrobat XI
60 apps in 60 minutes

Recently uploaded (20)

PPT
Gender sensitivity and fair language implementation
PDF
250811-FINAL-Bihar_Voter_Deletion_Analysis_Presentation.pdf
PPTX
Court PROCESS Notes_Law Clinic Notes.pptx
PPTX
4-D...Preparation of Research Design.pptx
PPTX
R.A. NO. 76 10 OR THE CHILD ABUSE LAW.pptx
PDF
NRL_Legal Regulation of Forests and Wildlife.pdf
PDF
Notes on Plausibility - A Review of the English and EPO Cases
PPTX
Basic key concepts of law by Shivam Dhawal
PPTX
Indian Medical Device Rules or Institute of Management Development and Research.
PDF
OpenAi v. Open AI Summary Judgment Order
PPTX
Law of Torts , unit I for BA.LLB integrated course
PPT
Understanding the Impact of the Cyber Act
PPT
looking_into_the_crystal_ball - Merger Control .ppt
PPTX
Peter Maatouk Is Redefining What It Means To Be A Local Lawyer Who Truly List...
PPT
Criminal law and civil law under of collage corriculum
PDF
Analysis Childrens act Kenya for the year 2022
PDF
Palghar-SGupta-ScreesnShots-12Aug25.pdf The image of the voter list with phot...
PDF
APPELLANT'S AMENDED BRIEF – DPW ENTERPRISES LLC & MOUNTAIN PRIME 2018 LLC v. ...
PDF
Trademark, Copyright, and Trade Secret Protection for Med Tech Startups.pdf
PPTX
BUSINESS LAW AND IT IN CONTRACT SIGNING AND MANAGEMENT
Gender sensitivity and fair language implementation
250811-FINAL-Bihar_Voter_Deletion_Analysis_Presentation.pdf
Court PROCESS Notes_Law Clinic Notes.pptx
4-D...Preparation of Research Design.pptx
R.A. NO. 76 10 OR THE CHILD ABUSE LAW.pptx
NRL_Legal Regulation of Forests and Wildlife.pdf
Notes on Plausibility - A Review of the English and EPO Cases
Basic key concepts of law by Shivam Dhawal
Indian Medical Device Rules or Institute of Management Development and Research.
OpenAi v. Open AI Summary Judgment Order
Law of Torts , unit I for BA.LLB integrated course
Understanding the Impact of the Cyber Act
looking_into_the_crystal_ball - Merger Control .ppt
Peter Maatouk Is Redefining What It Means To Be A Local Lawyer Who Truly List...
Criminal law and civil law under of collage corriculum
Analysis Childrens act Kenya for the year 2022
Palghar-SGupta-ScreesnShots-12Aug25.pdf The image of the voter list with phot...
APPELLANT'S AMENDED BRIEF – DPW ENTERPRISES LLC & MOUNTAIN PRIME 2018 LLC v. ...
Trademark, Copyright, and Trade Secret Protection for Med Tech Startups.pdf
BUSINESS LAW AND IT IN CONTRACT SIGNING AND MANAGEMENT

What to do after a data breach

  • 1. What to do After a Data Breach Posted on 09/14/2015 A data breach is a traumatizing event, regardless of how it occurs, and this has been a particularly active summer for thieves and scammers. In the past 12 months, Oregon lawyers have reported home and office break-ins, stolen laptops and mobile devices, and malware security intrusions. If you experience a data breach, here are the key steps you must take: 1. Contact an IT expert NOW before you pass go. The scope of the intrusion may reach beyond your stolen mobile device or the specifically infected computer. Until you know better, assume that all connected devices are part of the data breach. This might include your desktop computer, your assistant’s computer, your server, mobile devices used to access your network, and your home computer if you connect remotely to your office. Fixing security issues will require sleuthing, finding a solution to the problem, protecting existing data and devices not affected by the breach, testing security solutions, and potentially preserving forensic evidence. Don’t try to DIY! 2. Change vulnerable user names and passwords. At the first indication of a data breach, you won’t know exactly what went wrong – only that your information, or your clients’ information, has been been compromised. With your IT expert’s help, get access to a secure computer to change vulnerable user names and passwords. [If you modify your login credentials while a keylogger resides on your system, you’ve made the situation worse by supplying the hacker with your newly replaced user names and passwords.] 3. File a police report. Realistically, this isn’t likely to help. However, it may be required under the Oregon Consumer Identity Theft Protection Act [ORS 646A.600- 646A.628] or the terms of your insurance/coverage policy. 4. Report the breach to your property manager. If the breach occurred in connection with an office break-in, inform the property manager as soon as possible. Broken windows and locks should be fixed immediately to avoid further loss. If you believe inadequate security may have played a role in the break-in, it may be appropriate to assert a claim against the management or building owner. Research the issue or speak to outside counsel. Document your property loss and consider getting a commitment in writing about security improvements. 5. File claims with commercial carriers. Submit claims to any applicable insurance carriers: cyber liability and data breach, commercial liability, or others. 6. Contact the Professional Liability Fund. If you are an Oregon lawyer, contact the PLF. Beginning in 2013, the PLF added a Data Breach and Cyber Liability Endorsement to all excess coverage plans. The endorsement provides coverage for information security and privacy liability, privacy breach response services, regulatory defense and penalties, website media content liability, and crisis management and public relations services. The endorsement covers many claims that would otherwise be excluded. 7. Contact the Oregon State Bar. The OSB General Counsel’s office can give you advice about the ethical implications of a data breach. 8. Report identity theft to the FTC. If you are the victim of identity theft, file a report with the FTC as soon as possible. Review the FTC website for other steps not discussed here [reporting a misused social security number, removing bogus credit charges, replacing government-issued identification cards]. 9. Freeze or place fraud alerts on credit accounts. A freeze literally locks down your credit. No credit transactions can be authorized until you lift the freeze, temporarily or permanently. Fraud alerts inform you if someone is attempting to obtain newcredit in your name. Learn more about credit freezes and alerts here.
  • 2. 10. Protect bank accounts, credit cards, and debit cards. If banking, credit card, or debit card information was exposed in conjunction with the data breach, you may want to freeze your bank accounts [personal, general, IOLTA]; arrange for fraud protection services; or close your accounts altogether. Talk to your banks and credit/debit card providers. If you have automated payments tied to former bank accounts, credit or debit cards, be sure to update your information. This includes payment accounts associated with federal or state court eFiling systems. Continue to monitor statements for unauthorized transactions. 11. Notify clients. This is never easy, but clients must be informed if confidential information has been compromised. A sample notification letter is available on thePLF website. Select Practice Management > Forms > Client Relations > “Notice to Clients re Theft of Computer Equipment.” If you have questions about your ethical duties toward clients, speak to OSB General Counsel [see step 7 above]. Additionally, client notification may be a statutory responsibility under the Oregon Consumer Identity Theft Protection Act [ORS 646A.600-646A.628]. 12. Begin reconstructing files if needed. Lawyers who are straightforward about an office break-in or theft often find that clients are sympathetic, understanding, and more than willing to help. With a bit of luck, you should be able to reconstruct most or all of your files from your backup or documents supplied by clients. 13. Monitor your credit report. Check your credit reports at annualcreditreport.comfor signs of fraud. Annualcreditreport.com is the only official source for free credit reports authorized by the Federal Trade Commission. 14. Monitor Craigslist. If you believe a thief has posted your property for sale, inform police. 15. Start using encryption. Read “Encryption Made Simple for Lawyers” as a starter, then check out these resources from the ABA Legal Technology Resource Center. For reviews of encryption products, check out LawSites. [In the navigation pane on the right, scroll midway down the page to Search LawSites.] If you want anencrypted password manager – a very good idea – see these top picks for 2015. Shopping for a new laptop? Don’t forget that hard drive encryption is automatically built into the MacBook. Using Windows OS? Sorry, you’ll need to buy your own encryption software. If all this seems overwhelming, talk to your IT expert. 16. Backup, backup, backup! Online backup services are a great way to automatically back up data. Read more about backup protocols and available resources on thePLF website. Select Practice Management > Forms > Technology > “How to Backup Your Computer” and “Online Data Storage.” 17. No cyber liability or data breach coverage? Buy it! If your claims weren’t covered, purchase cyber liability and data breach insurance to protect against future loss – privately or through the PLF as part of our excess program. [See item 6 above.] 18. Stay vigilant. Fixing a data breach does not mean that scammers or hackers will stop. Watch out for phishing attempts. Don’t click on suspicious links in emails, texts, or social media messages. I’ve written over 20 blog posts on the subject of scams. To find the posts, visit my blog’s landing page. In the search box in the upper right corner, enter “scam.” You’ll also find seven In Brief articles on the PLF website. Select Practice Management > Publications > In Brief and enter “scam” in the search by keyword or year box. See also Jennifer Meisberger, “Sophisticated Scams: Protect Your Clients’ Money,” Oregon State Bar Bulletin (June 2015) and the PLF CLE, Protecting Your Firm and Your Client from Scams, Fraud, and Financial Loss. All Rights Reserved [2015] Beverly Michaelis