SlideShare une entreprise Scribd logo
1  sur  2
Télécharger pour lire hors ligne
What to do After a Data Breach
Posted on 09/14/2015
A data breach is a traumatizing event, regardless of how it occurs, and this has been a particularly active summer for thieves and
scammers.
In the past 12 months, Oregon lawyers have reported home and office break-ins, stolen laptops and mobile devices, and malware
security intrusions. If you experience a data breach, here are the key steps you must take:
1. Contact an IT expert NOW before you pass go. The scope of the intrusion may reach beyond your stolen mobile
device or the specifically infected computer. Until you know better, assume that all connected devices are part of the data
breach. This might include your desktop computer, your assistant’s computer, your server, mobile devices used to access
your network, and your home computer if you connect remotely to your office. Fixing security issues will require
sleuthing, finding a solution to the problem, protecting existing data and devices not affected by the breach, testing
security solutions, and potentially preserving forensic evidence. Don’t try to DIY!
2. Change vulnerable user names and passwords. At the first indication of a data breach, you won’t know exactly what
went wrong – only that your information, or your clients’ information, has been been compromised. With your IT
expert’s help, get access to a secure computer to change vulnerable user names and passwords. [If you modify your
login credentials while a keylogger resides on your system, you’ve made the situation worse by supplying the hacker
with your newly replaced user names and passwords.]
3. File a police report. Realistically, this isn’t likely to help. However, it may be required under the Oregon Consumer
Identity Theft Protection Act [ORS 646A.600- 646A.628] or the terms of your insurance/coverage policy.
4. Report the breach to your property manager. If the breach occurred in connection with an office break-in, inform the
property manager as soon as possible. Broken windows and locks should be fixed immediately to avoid further loss. If
you believe inadequate security may have played a role in the break-in, it may be appropriate to assert a claim against the
management or building owner. Research the issue or speak to outside counsel. Document your property loss and
consider getting a commitment in writing about security improvements.
5. File claims with commercial carriers. Submit claims to any applicable insurance carriers: cyber liability and data
breach, commercial liability, or others.
6. Contact the Professional Liability Fund. If you are an Oregon lawyer, contact the PLF. Beginning in 2013, the PLF
added a Data Breach and Cyber Liability Endorsement to all excess coverage plans. The endorsement provides coverage
for information security and privacy liability, privacy breach response services, regulatory defense and penalties, website
media content liability, and crisis management and public relations services. The endorsement covers many claims that
would otherwise be excluded.
7. Contact the Oregon State Bar. The OSB General Counsel’s office can give you advice about the ethical implications
of a data breach.
8. Report identity theft to the FTC. If you are the victim of identity theft, file a report with the FTC as soon as possible.
Review the FTC website for other steps not discussed here [reporting a misused social security number, removing bogus
credit charges, replacing government-issued identification cards].
9. Freeze or place fraud alerts on credit accounts. A freeze literally locks down your credit. No credit transactions
can be authorized until you lift the freeze, temporarily or permanently. Fraud alerts inform you if someone is attempting
to obtain newcredit in your name. Learn more about credit freezes and alerts here.
10. Protect bank accounts, credit cards, and debit cards. If banking, credit card, or debit card information was exposed
in conjunction with the data breach, you may want to freeze your bank accounts [personal, general, IOLTA]; arrange
for fraud protection services; or close your accounts altogether. Talk to your banks and credit/debit card providers. If
you have automated payments tied to former bank accounts, credit or debit cards, be sure to update your information.
This includes payment accounts associated with federal or state court eFiling systems. Continue to monitor statements
for unauthorized transactions.
11. Notify clients. This is never easy, but clients must be informed if confidential information has been compromised. A
sample notification letter is available on thePLF website. Select Practice Management > Forms > Client Relations >
“Notice to Clients re Theft of Computer Equipment.” If you have questions about your ethical duties toward clients,
speak to OSB General Counsel [see step 7 above]. Additionally, client notification may be a statutory
responsibility under the Oregon Consumer Identity Theft Protection Act [ORS 646A.600-646A.628].
12. Begin reconstructing files if needed. Lawyers who are straightforward about an office break-in or theft often find that
clients are sympathetic, understanding, and more than willing to help. With a bit of luck, you should be able to
reconstruct most or all of your files from your backup or documents supplied by clients.
13. Monitor your credit report. Check your credit reports at annualcreditreport.comfor signs of fraud.
Annualcreditreport.com is the only official source for free credit reports authorized by the Federal Trade Commission.
14. Monitor Craigslist. If you believe a thief has posted your property for sale, inform police.
15. Start using encryption. Read “Encryption Made Simple for Lawyers” as a starter, then check out these resources from
the ABA Legal Technology Resource Center. For reviews of encryption products, check out LawSites. [In the
navigation pane on the right, scroll midway down the page to Search LawSites.] If you want anencrypted password
manager – a very good idea – see these top picks for 2015. Shopping for a new laptop? Don’t forget that hard drive
encryption is automatically built into the MacBook. Using Windows OS? Sorry, you’ll need to buy your own encryption
software. If all this seems overwhelming, talk to your IT expert.
16. Backup, backup, backup! Online backup services are a great way to automatically back up data. Read more about
backup protocols and available resources on thePLF website. Select Practice Management > Forms > Technology >
“How to Backup Your Computer” and “Online Data Storage.”
17. No cyber liability or data breach coverage? Buy it! If your claims weren’t covered, purchase cyber liability and data
breach insurance to protect against future loss – privately or through the PLF as part of our excess program. [See item 6
above.]
18. Stay vigilant. Fixing a data breach does not mean that scammers or hackers will stop. Watch out for phishing attempts.
Don’t click on suspicious links in emails, texts, or social media messages. I’ve written over 20 blog posts on the subject
of scams. To find the posts, visit my blog’s landing page. In the search box in the upper right corner, enter “scam.”
You’ll also find seven In Brief articles on the PLF website. Select Practice Management > Publications > In Brief and
enter “scam” in the search by keyword or year box. See also Jennifer Meisberger, “Sophisticated Scams: Protect Your
Clients’ Money,” Oregon State Bar Bulletin (June 2015) and the PLF CLE, Protecting Your Firm and Your Client from
Scams, Fraud, and Financial Loss.
All Rights Reserved [2015] Beverly Michaelis

Contenu connexe

Tendances

Government Notification of Data Breach
Government Notification of Data BreachGovernment Notification of Data Breach
Government Notification of Data BreachShawn Tuma
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseSharing Slides Training
 
Identity theft pp presentation
Identity theft pp presentationIdentity theft pp presentation
Identity theft pp presentationYusuf Qadir
 
E commerce - Data Integrity and Security
E commerce - Data Integrity and SecurityE commerce - Data Integrity and Security
E commerce - Data Integrity and SecurityJamie Hutt
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowAct-On Software
 
Hedna pii is your goldmine a landmine
Hedna   pii is your goldmine a landmineHedna   pii is your goldmine a landmine
Hedna pii is your goldmine a landmineEvelyne Oreskovich
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarDon Grauel
 
Target data breach case study
Target data breach case studyTarget data breach case study
Target data breach case studyAbhilash vijayan
 
MA Privacy Law
MA Privacy LawMA Privacy Law
MA Privacy Lawtravismd
 
When Data Loss Is An Inside Job
When Data Loss Is An Inside JobWhen Data Loss Is An Inside Job
When Data Loss Is An Inside JobIDT911
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationChristina Gagnier
 
Data Breach White Paper
Data Breach White PaperData Breach White Paper
Data Breach White Paperspencerharry
 
Equifax data breach
Equifax data breachEquifax data breach
Equifax data breachSajib Sen
 
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015Robert Craig
 

Tendances (20)

Government Notification of Data Breach
Government Notification of Data BreachGovernment Notification of Data Breach
Government Notification of Data Breach
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
 
Identity theft pp presentation
Identity theft pp presentationIdentity theft pp presentation
Identity theft pp presentation
 
Cyber Facts and Prevention Presentation Gianino
Cyber Facts and Prevention Presentation GianinoCyber Facts and Prevention Presentation Gianino
Cyber Facts and Prevention Presentation Gianino
 
E commerce - Data Integrity and Security
E commerce - Data Integrity and SecurityE commerce - Data Integrity and Security
E commerce - Data Integrity and Security
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to Know
 
Cloud Privacy
Cloud PrivacyCloud Privacy
Cloud Privacy
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Hedna pii is your goldmine a landmine
Hedna   pii is your goldmine a landmineHedna   pii is your goldmine a landmine
Hedna pii is your goldmine a landmine
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
 
Target data breach case study
Target data breach case studyTarget data breach case study
Target data breach case study
 
MA Privacy Law
MA Privacy LawMA Privacy Law
MA Privacy Law
 
Identity Theft
Identity Theft Identity Theft
Identity Theft
 
When Data Loss Is An Inside Job
When Data Loss Is An Inside JobWhen Data Loss Is An Inside Job
When Data Loss Is An Inside Job
 
Data Breach Detection: Are you ready for GDPR?
Data Breach Detection: Are you ready for GDPR?Data Breach Detection: Are you ready for GDPR?
Data Breach Detection: Are you ready for GDPR?
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
 
Data Breach White Paper
Data Breach White PaperData Breach White Paper
Data Breach White Paper
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Equifax data breach
Equifax data breachEquifax data breach
Equifax data breach
 
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
 

En vedette

Retrieving attorney court calendars and case information online
Retrieving attorney court calendars and case information onlineRetrieving attorney court calendars and case information online
Retrieving attorney court calendars and case information onlineOregon Law Practice Management
 
Adventure Based Team Building Brochure
Adventure Based Team Building BrochureAdventure Based Team Building Brochure
Adventure Based Team Building BrochureCarly Thorne
 
Gc0594 employment fact sheet final a_screen
Gc0594 employment fact sheet final a_screenGc0594 employment fact sheet final a_screen
Gc0594 employment fact sheet final a_screenStephanie Bonnet
 
Content is King - Matthew Smith, VP IDG Connect, Europe, Jeremy Bevan, Vice P...
Content is King - Matthew Smith, VP IDG Connect, Europe, Jeremy Bevan, Vice P...Content is King - Matthew Smith, VP IDG Connect, Europe, Jeremy Bevan, Vice P...
Content is King - Matthew Smith, VP IDG Connect, Europe, Jeremy Bevan, Vice P...Demand Generation Summit
 
December 2015 single read
December 2015 single readDecember 2015 single read
December 2015 single readPaul Vincent
 
Understanding the New Filing Fee Requirements in Civil Cases (HB 2287)
Understanding the New Filing Fee Requirements in Civil Cases (HB 2287)Understanding the New Filing Fee Requirements in Civil Cases (HB 2287)
Understanding the New Filing Fee Requirements in Civil Cases (HB 2287)Oregon Law Practice Management
 
CSN09112: Introduction to Computer Security
CSN09112: Introduction to Computer SecurityCSN09112: Introduction to Computer Security
CSN09112: Introduction to Computer SecurityNapier University
 
Personal learning networks
Personal learning networksPersonal learning networks
Personal learning networksTAFENSW Online
 
Cheatsheet
CheatsheetCheatsheet
Cheatsheetbvaz
 
Master Your Personal Brand to Advance Your Career
Master Your Personal Brand to Advance Your CareerMaster Your Personal Brand to Advance Your Career
Master Your Personal Brand to Advance Your CareerLinkedIn Talent Solutions
 
Starbucks Brand Audit
Starbucks Brand AuditStarbucks Brand Audit
Starbucks Brand AuditLaura Terry
 

En vedette (14)

Retrieving attorney court calendars and case information online
Retrieving attorney court calendars and case information onlineRetrieving attorney court calendars and case information online
Retrieving attorney court calendars and case information online
 
Adventure Based Team Building Brochure
Adventure Based Team Building BrochureAdventure Based Team Building Brochure
Adventure Based Team Building Brochure
 
Web Sites From the 2009 ABA TECHSHOW
Web Sites From the 2009 ABA TECHSHOWWeb Sites From the 2009 ABA TECHSHOW
Web Sites From the 2009 ABA TECHSHOW
 
Confidentiality: A Responsibility of Legal Staff
Confidentiality: A Responsibility of Legal StaffConfidentiality: A Responsibility of Legal Staff
Confidentiality: A Responsibility of Legal Staff
 
Beware of These Traps in E-Filing and E-Notices
Beware of These Traps in E-Filing and E-NoticesBeware of These Traps in E-Filing and E-Notices
Beware of These Traps in E-Filing and E-Notices
 
Gc0594 employment fact sheet final a_screen
Gc0594 employment fact sheet final a_screenGc0594 employment fact sheet final a_screen
Gc0594 employment fact sheet final a_screen
 
Content is King - Matthew Smith, VP IDG Connect, Europe, Jeremy Bevan, Vice P...
Content is King - Matthew Smith, VP IDG Connect, Europe, Jeremy Bevan, Vice P...Content is King - Matthew Smith, VP IDG Connect, Europe, Jeremy Bevan, Vice P...
Content is King - Matthew Smith, VP IDG Connect, Europe, Jeremy Bevan, Vice P...
 
December 2015 single read
December 2015 single readDecember 2015 single read
December 2015 single read
 
Understanding the New Filing Fee Requirements in Civil Cases (HB 2287)
Understanding the New Filing Fee Requirements in Civil Cases (HB 2287)Understanding the New Filing Fee Requirements in Civil Cases (HB 2287)
Understanding the New Filing Fee Requirements in Civil Cases (HB 2287)
 
CSN09112: Introduction to Computer Security
CSN09112: Introduction to Computer SecurityCSN09112: Introduction to Computer Security
CSN09112: Introduction to Computer Security
 
Personal learning networks
Personal learning networksPersonal learning networks
Personal learning networks
 
Cheatsheet
CheatsheetCheatsheet
Cheatsheet
 
Master Your Personal Brand to Advance Your Career
Master Your Personal Brand to Advance Your CareerMaster Your Personal Brand to Advance Your Career
Master Your Personal Brand to Advance Your Career
 
Starbucks Brand Audit
Starbucks Brand AuditStarbucks Brand Audit
Starbucks Brand Audit
 

Similaire à What to do after a data breach

Ten Protective Steps to Address the Equifax Breach
Ten Protective Steps to Address the Equifax BreachTen Protective Steps to Address the Equifax Breach
Ten Protective Steps to Address the Equifax BreachDaniel Michels
 
FTC Protecting Info A Guide For Business Powerpoint
FTC  Protecting  Info A  Guide  For  Business  PowerpointFTC  Protecting  Info A  Guide  For  Business  Powerpoint
FTC Protecting Info A Guide For Business PowerpointBucacci Business Solutions
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextBrian Pichman
 
Enterprise Ready for Amazon Web Services
Enterprise Ready for Amazon Web ServicesEnterprise Ready for Amazon Web Services
Enterprise Ready for Amazon Web ServicesRichard Rendell
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber securityHelen Carpenter
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jacksonaiimnevada
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business- Mark - Fullbright
 
How to Effectively Manage a Data Breach
How to Effectively Manage a Data Breach How to Effectively Manage a Data Breach
How to Effectively Manage a Data Breach SecurityMetrics
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6seadeloitte
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3Meg Weber
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...Security B-Sides
 
Data Breach Response: Before and After the Breach (Series: Cybersecurity & Da...
Data Breach Response: Before and After the Breach (Series: Cybersecurity & Da...Data Breach Response: Before and After the Breach (Series: Cybersecurity & Da...
Data Breach Response: Before and After the Breach (Series: Cybersecurity & Da...Financial Poise
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionAlan Greggo
 
5 Tips How To Stay Secure During Tax Season 2018
5 Tips How To Stay Secure During Tax Season 20185 Tips How To Stay Secure During Tax Season 2018
5 Tips How To Stay Secure During Tax Season 2018Deepanshu Gahlaut
 

Similaire à What to do after a data breach (20)

Ten Protective Steps to Address the Equifax Breach
Ten Protective Steps to Address the Equifax BreachTen Protective Steps to Address the Equifax Breach
Ten Protective Steps to Address the Equifax Breach
 
FTC Protecting Info A Guide For Business Powerpoint
FTC  Protecting  Info A  Guide  For  Business  PowerpointFTC  Protecting  Info A  Guide  For  Business  Powerpoint
FTC Protecting Info A Guide For Business Powerpoint
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take Next
 
Enterprise Ready for Amazon Web Services
Enterprise Ready for Amazon Web ServicesEnterprise Ready for Amazon Web Services
Enterprise Ready for Amazon Web Services
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber security
 
Identity Theft Information for Businesses
Identity Theft Information for BusinessesIdentity Theft Information for Businesses
Identity Theft Information for Businesses
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jackson
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business
 
How to Effectively Manage a Data Breach
How to Effectively Manage a Data Breach How to Effectively Manage a Data Breach
How to Effectively Manage a Data Breach
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6
 
Canadian Consumer Handbook
Canadian Consumer HandbookCanadian Consumer Handbook
Canadian Consumer Handbook
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
Freeze Your Credit File
Freeze Your Credit FileFreeze Your Credit File
Freeze Your Credit File
 
Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools Tactics
 
How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...
 
Cyber Liability Risk
Cyber Liability RiskCyber Liability Risk
Cyber Liability Risk
 
Data Breach Response: Before and After the Breach (Series: Cybersecurity & Da...
Data Breach Response: Before and After the Breach (Series: Cybersecurity & Da...Data Breach Response: Before and After the Breach (Series: Cybersecurity & Da...
Data Breach Response: Before and After the Breach (Series: Cybersecurity & Da...
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
5 Tips How To Stay Secure During Tax Season 2018
5 Tips How To Stay Secure During Tax Season 20185 Tips How To Stay Secure During Tax Season 2018
5 Tips How To Stay Secure During Tax Season 2018
 

Plus de Oregon Law Practice Management

Do lawyers have an ethical duty to replace hacked funds?
Do lawyers have an ethical duty to replace hacked funds?Do lawyers have an ethical duty to replace hacked funds?
Do lawyers have an ethical duty to replace hacked funds?Oregon Law Practice Management
 

Plus de Oregon Law Practice Management (20)

Protecting your iolta and operating accounts
Protecting your iolta and operating accountsProtecting your iolta and operating accounts
Protecting your iolta and operating accounts
 
OJD iForms - interactive court forms for the public
OJD iForms - interactive court forms for the publicOJD iForms - interactive court forms for the public
OJD iForms - interactive court forms for the public
 
The continuum of client communication
The continuum of client communicationThe continuum of client communication
The continuum of client communication
 
Scams will never stop
Scams will never stopScams will never stop
Scams will never stop
 
7 steps you can take now to protect your data
7 steps you can take now to protect your data7 steps you can take now to protect your data
7 steps you can take now to protect your data
 
A bright future for new lawyers
A bright future for new lawyersA bright future for new lawyers
A bright future for new lawyers
 
Do lawyers have an ethical duty to replace hacked funds?
Do lawyers have an ethical duty to replace hacked funds?Do lawyers have an ethical duty to replace hacked funds?
Do lawyers have an ethical duty to replace hacked funds?
 
Formatting legal documents with Microsoft Word 2016
Formatting legal documents with Microsoft Word 2016Formatting legal documents with Microsoft Word 2016
Formatting legal documents with Microsoft Word 2016
 
UTCR amendments 2016
UTCR amendments 2016UTCR amendments 2016
UTCR amendments 2016
 
eCourt malpractice traps and relation back
eCourt malpractice traps and relation backeCourt malpractice traps and relation back
eCourt malpractice traps and relation back
 
Marketing and client development in three easy steps
Marketing and client development in three easy stepsMarketing and client development in three easy steps
Marketing and client development in three easy steps
 
The 7 golden rules of collections
The 7 golden rules of collectionsThe 7 golden rules of collections
The 7 golden rules of collections
 
Bankruptcy for the non bankruptcy lawyer
Bankruptcy for the non bankruptcy lawyerBankruptcy for the non bankruptcy lawyer
Bankruptcy for the non bankruptcy lawyer
 
Oregon ecourt and arbitration
Oregon ecourt and arbitrationOregon ecourt and arbitration
Oregon ecourt and arbitration
 
The year in review - top posts of 2015
The year in review - top posts of 2015The year in review - top posts of 2015
The year in review - top posts of 2015
 
Glitches in oregon e service
Glitches in oregon e serviceGlitches in oregon e service
Glitches in oregon e service
 
Editing scanned pdfs in acrobat xi or dc
Editing scanned pdfs in acrobat xi or dcEditing scanned pdfs in acrobat xi or dc
Editing scanned pdfs in acrobat xi or dc
 
How to name client folders
How to name client foldersHow to name client folders
How to name client folders
 
Redaction tool in Acrobat XI
Redaction tool in Acrobat XIRedaction tool in Acrobat XI
Redaction tool in Acrobat XI
 
60 apps in 60 minutes
60 apps in 60 minutes60 apps in 60 minutes
60 apps in 60 minutes
 

Dernier

一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书E LSS
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书SS A
 
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881mayurchatre90
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxRRR Chambers
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书Fs Las
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdfSUSHMITAPOTHAL
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptzainabbkhaleeq123
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxRRR Chambers
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueSkyLaw Professional Corporation
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdflaysamaeguardiano
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书Fs Las
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxnyabatejosphat1
 
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceanilsa9823
 
Debt Collection in India - General Procedure
Debt Collection in India  - General ProcedureDebt Collection in India  - General Procedure
Debt Collection in India - General ProcedureBridgeWest.eu
 

Dernier (20)

一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书
 
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
 
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptx
 
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
Old Income Tax Regime Vs New Income Tax Regime
Old  Income Tax Regime Vs  New Income Tax   RegimeOld  Income Tax Regime Vs  New Income Tax   Regime
Old Income Tax Regime Vs New Income Tax Regime
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .ppt
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
 
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptx
 
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
 
Debt Collection in India - General Procedure
Debt Collection in India  - General ProcedureDebt Collection in India  - General Procedure
Debt Collection in India - General Procedure
 
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 

What to do after a data breach

  • 1. What to do After a Data Breach Posted on 09/14/2015 A data breach is a traumatizing event, regardless of how it occurs, and this has been a particularly active summer for thieves and scammers. In the past 12 months, Oregon lawyers have reported home and office break-ins, stolen laptops and mobile devices, and malware security intrusions. If you experience a data breach, here are the key steps you must take: 1. Contact an IT expert NOW before you pass go. The scope of the intrusion may reach beyond your stolen mobile device or the specifically infected computer. Until you know better, assume that all connected devices are part of the data breach. This might include your desktop computer, your assistant’s computer, your server, mobile devices used to access your network, and your home computer if you connect remotely to your office. Fixing security issues will require sleuthing, finding a solution to the problem, protecting existing data and devices not affected by the breach, testing security solutions, and potentially preserving forensic evidence. Don’t try to DIY! 2. Change vulnerable user names and passwords. At the first indication of a data breach, you won’t know exactly what went wrong – only that your information, or your clients’ information, has been been compromised. With your IT expert’s help, get access to a secure computer to change vulnerable user names and passwords. [If you modify your login credentials while a keylogger resides on your system, you’ve made the situation worse by supplying the hacker with your newly replaced user names and passwords.] 3. File a police report. Realistically, this isn’t likely to help. However, it may be required under the Oregon Consumer Identity Theft Protection Act [ORS 646A.600- 646A.628] or the terms of your insurance/coverage policy. 4. Report the breach to your property manager. If the breach occurred in connection with an office break-in, inform the property manager as soon as possible. Broken windows and locks should be fixed immediately to avoid further loss. If you believe inadequate security may have played a role in the break-in, it may be appropriate to assert a claim against the management or building owner. Research the issue or speak to outside counsel. Document your property loss and consider getting a commitment in writing about security improvements. 5. File claims with commercial carriers. Submit claims to any applicable insurance carriers: cyber liability and data breach, commercial liability, or others. 6. Contact the Professional Liability Fund. If you are an Oregon lawyer, contact the PLF. Beginning in 2013, the PLF added a Data Breach and Cyber Liability Endorsement to all excess coverage plans. The endorsement provides coverage for information security and privacy liability, privacy breach response services, regulatory defense and penalties, website media content liability, and crisis management and public relations services. The endorsement covers many claims that would otherwise be excluded. 7. Contact the Oregon State Bar. The OSB General Counsel’s office can give you advice about the ethical implications of a data breach. 8. Report identity theft to the FTC. If you are the victim of identity theft, file a report with the FTC as soon as possible. Review the FTC website for other steps not discussed here [reporting a misused social security number, removing bogus credit charges, replacing government-issued identification cards]. 9. Freeze or place fraud alerts on credit accounts. A freeze literally locks down your credit. No credit transactions can be authorized until you lift the freeze, temporarily or permanently. Fraud alerts inform you if someone is attempting to obtain newcredit in your name. Learn more about credit freezes and alerts here.
  • 2. 10. Protect bank accounts, credit cards, and debit cards. If banking, credit card, or debit card information was exposed in conjunction with the data breach, you may want to freeze your bank accounts [personal, general, IOLTA]; arrange for fraud protection services; or close your accounts altogether. Talk to your banks and credit/debit card providers. If you have automated payments tied to former bank accounts, credit or debit cards, be sure to update your information. This includes payment accounts associated with federal or state court eFiling systems. Continue to monitor statements for unauthorized transactions. 11. Notify clients. This is never easy, but clients must be informed if confidential information has been compromised. A sample notification letter is available on thePLF website. Select Practice Management > Forms > Client Relations > “Notice to Clients re Theft of Computer Equipment.” If you have questions about your ethical duties toward clients, speak to OSB General Counsel [see step 7 above]. Additionally, client notification may be a statutory responsibility under the Oregon Consumer Identity Theft Protection Act [ORS 646A.600-646A.628]. 12. Begin reconstructing files if needed. Lawyers who are straightforward about an office break-in or theft often find that clients are sympathetic, understanding, and more than willing to help. With a bit of luck, you should be able to reconstruct most or all of your files from your backup or documents supplied by clients. 13. Monitor your credit report. Check your credit reports at annualcreditreport.comfor signs of fraud. Annualcreditreport.com is the only official source for free credit reports authorized by the Federal Trade Commission. 14. Monitor Craigslist. If you believe a thief has posted your property for sale, inform police. 15. Start using encryption. Read “Encryption Made Simple for Lawyers” as a starter, then check out these resources from the ABA Legal Technology Resource Center. For reviews of encryption products, check out LawSites. [In the navigation pane on the right, scroll midway down the page to Search LawSites.] If you want anencrypted password manager – a very good idea – see these top picks for 2015. Shopping for a new laptop? Don’t forget that hard drive encryption is automatically built into the MacBook. Using Windows OS? Sorry, you’ll need to buy your own encryption software. If all this seems overwhelming, talk to your IT expert. 16. Backup, backup, backup! Online backup services are a great way to automatically back up data. Read more about backup protocols and available resources on thePLF website. Select Practice Management > Forms > Technology > “How to Backup Your Computer” and “Online Data Storage.” 17. No cyber liability or data breach coverage? Buy it! If your claims weren’t covered, purchase cyber liability and data breach insurance to protect against future loss – privately or through the PLF as part of our excess program. [See item 6 above.] 18. Stay vigilant. Fixing a data breach does not mean that scammers or hackers will stop. Watch out for phishing attempts. Don’t click on suspicious links in emails, texts, or social media messages. I’ve written over 20 blog posts on the subject of scams. To find the posts, visit my blog’s landing page. In the search box in the upper right corner, enter “scam.” You’ll also find seven In Brief articles on the PLF website. Select Practice Management > Publications > In Brief and enter “scam” in the search by keyword or year box. See also Jennifer Meisberger, “Sophisticated Scams: Protect Your Clients’ Money,” Oregon State Bar Bulletin (June 2015) and the PLF CLE, Protecting Your Firm and Your Client from Scams, Fraud, and Financial Loss. All Rights Reserved [2015] Beverly Michaelis