Data breaches are, for most organisations, a crushing blow to their customers and staff s confidence in them, to their reputation and brand value, and to the career prospects of senior executives. A data breach may be an even bigger calamity to the individuals whose data has been exposed to Internet criminals, to the press and, possibly, to malicious and ill-wishing acquaintances. Identity theft is a growing problem, and one which is inadequately policed. Individuals whose personal and/or financial data has been breached can find that their credit histories are compromised, and may have to spend years and substantial sums clearing their names. Provides essential support - putting measures in place Those organisations that have a tried and tested procedure in place for dealing with data breaches will not only put themselves in a position to obey the current and emerging data breach legislation but, more importantly, will enable themselves to win back some respect from the customers whose data has been breached. This pocket guide provides essential support for organisations tackling this mission.
This booklet cannot provide all the answers for every company, but it aims to provide a loose blueprint to ensure that you know what steps you must take to rectify the situation, which authorities you need to inform, and how to put measures in place to make sure the embarrassment of a data breach never darkens your door again. The information is drawn from various regulatory publications, and interviews with security experts, lawyers and software suppliers.
Sprache
Verlagsort
Maße
Höhe: 165 mm
Breite: 95 mm
Dicke: 4 mm
Gewicht
ISBN-13
978-1-905356-96-6 (9781905356966)
Copyright in bibliographic data and cover images is held by Nielsen Book Services Limited or by the publishers or by their respective licensors: all rights reserved.
Schweitzer Klassifikation
Stewart Mitchell has been an IT journalist for more than 10 years, working across a number of publications including the Sunday Times and specialist magazines such as PC Pro, Computer Shopper and PC Adviser. He has run his own Internet-based business for the last four years and regularly meets with IT business leaders. Even in the dark, Mitchell wouldn't pretend to be a techie, but he knows an awful lot of people who are, as well as many IT executives who manage those techies. A solid understanding of the issues surrounding IT for the business, coupled with an ability to translate geek speak into something slightly more understandable, makes him a conduit of digestible information.
Introduction 1 Chapter 1: Assessment and Containment 5 Hit the ground running 5 The penny drops 6 Dissecting the data 8 Severity assessment 9 Let the response fit the crime 10 Gathering evidence 11 Chapter 2: Notification 15 The disclosure conundrum 15 Data notification and UK law 16 Data notification and US law 18 Who to inform 20 Notification infrastructure 22 Public relations considerations 23 Chapter 3: Winning Hearts and Minds 25 Formulating a media strategy 25 Keeping customers onside 27 Chapter 4: Post-Breach Review 29 Learning from mistakes 29 Red alert for IT 30 Forming a data breach recovery plan 31 Planning privacy into the system 32 Enforce policy 34 Appendix 37 ITG Resources 39