Privacy Incident Response and Data Breach Procedures
This guide provides step-by-step procedures for detecting, assessing, responding to, and reporting privacy incidents and data breaches. Learn how to comply with notification requirements under GDPR (72 hours), CCPA, and state privacy laws while minimizing damage and protecting affected individuals.
Table of Contents
- Overview: Understanding Privacy Incidents
- Incident Detection and Classification
- What Constitutes a "Breach"
- Initial Response Procedures
- Incident Assessment and Investigation
- Notification Requirements by Regulation
- Breach Notification Procedures
- Internal Response Team
- Documentation Requirements
- Post-Incident Review and Remediation
- Prevention and Preparedness
- Common Scenarios and Responses
- Implementation Checklist
- Related Documentation
Overview: Understanding Privacy Incidents
What Is a Privacy Incident?
A privacy incident is any event that compromises the confidentiality, integrity, or availability of personal information. This includes:
- Unauthorized Access: Someone gains access to personal data without authorization
- Data Loss: Personal data is lost or destroyed
- Data Theft: Personal data is stolen
- Data Disclosure: Personal data is accidentally disclosed
- System Compromise: Systems containing personal data are compromised
- Ransomware: Systems are encrypted and data is inaccessible
- Physical Theft: Devices containing personal data are stolen
Incident vs. Breach
Not All Incidents Are Breaches:
- Incident: Any security or privacy event
- Breach: Incident that results in unauthorized access to or disclosure of personal data
Key Distinction:
- An incident may not be a breach if no personal data was accessed
- A breach is a specific type of incident that triggers notification requirements
Why This Matters
Legal Requirements:
- GDPR: Must notify supervisory authority within 72 hours
- CCPA: Must notify affected individuals and Attorney General
- State Laws: Varying notification requirements (typically 30-60 days)
- Sector-Specific: HIPAA (60 days), GLBA (as soon as possible)
Business Impact:
- Fines and penalties for non-compliance
- Loss of customer trust
- Reputational damage
- Legal liability
- Business disruption
Incident Detection and Classification
Detection Methods
Automated Detection:
- Security monitoring systems
- Intrusion detection systems
- Log analysis tools
- Anomaly detection
- Data loss prevention (DLP) tools
Manual Detection:
- Employee reports
- Customer complaints
- Vendor notifications
- Security audits
- Penetration testing findings
Incident Classification
Severity Levels:
Critical:
- Large-scale data breach
- Sensitive data compromised (health, financial, SSN)
- Active ongoing attack
- Action: Immediate response, 24/7 monitoring
High:
- Moderate data exposure
- Personal data at risk
- System compromise
- Action: Rapid response, same-day assessment
Medium:
- Limited data exposure
- Low sensitivity data
- Potential risk
- Action: Standard response, within 48 hours
Low:
- Minimal data exposure
- Public data only
- No actual breach
- Action: Document and monitor
Classification Checklist
Step 1: Initial Classification
- Determine if incident involves personal data
- Assess data sensitivity (health, financial, etc.)
- Estimate number of affected individuals
- Determine if data was actually accessed
- Classify severity level (Critical/High/Medium/Low)
- Assign incident ID and log in system
Step 2: Immediate Actions
- Contain the incident (if ongoing)
- Preserve evidence
- Notify incident response team
- Document initial findings
- Determine if breach notification required
What Constitutes a "Breach"
GDPR Definition
Personal Data Breach (Article 4): "A breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored or otherwise processed."
Key Elements:
- Breach of security
- Accidental OR unlawful
- Destruction, loss, alteration, disclosure, OR access
- Personal data involved
CCPA/CPRA Definition
Breach: "Unauthorized access and exfiltration, theft, or disclosure of personal information as a result of the business's violation of the duty to implement and maintain reasonable security procedures."
Key Elements:
- Unauthorized access
- Exfiltration, theft, OR disclosure
- Business violated security duty
State Privacy Laws
Common Definition: Unauthorized access to or acquisition of personal information that compromises security, confidentiality, or integrity.
Variations:
- Some states require "acquisition" (data actually taken)
- Others require only "access" (data viewed but not taken)
- Some exclude encrypted data if encryption key not compromised
When Is It NOT a Breach?
Examples of Non-Breaches:
- Accidental internal access by authorized employee (if no misuse)
- Data properly encrypted and key not compromised
- Data already publicly available
- Test data or anonymized data
- Authorized disclosure (with user consent)
Note: Even if not a "breach" under law, may still be an incident requiring response.
Breach Assessment Checklist
Step 1: Determine If Breach Occurred
- Was personal data involved?
- Was there unauthorized access or disclosure?
- Was data actually accessed (not just attempted)?
- Does incident meet legal definition of breach?
- Document assessment and reasoning
Step 2: Assess Breach Scope
- What types of personal data were involved?
- How many individuals affected?
- What data elements were exposed?
- Was sensitive data involved (SSN, health, financial)?
- Was data encrypted?
- What was the method of breach?
Initial Response Procedures
Immediate Actions (First Hour)
Containment:
-
Isolate Affected Systems
- Disconnect from network if necessary
- Disable compromised accounts
- Block malicious IP addresses
- Preserve evidence
-
Assess Ongoing Risk
- Is attack still ongoing?
- Are other systems at risk?
- Is data still being accessed?
-
Preserve Evidence
- Take screenshots
- Save logs
- Document timeline
- Don't delete anything yet
Initial Response Checklist
Step 1: Contain the Incident
- Isolate affected systems or accounts
- Disable compromised credentials
- Block malicious IP addresses or domains
- Preserve system logs and evidence
- Document containment actions taken
Step 2: Notify Response Team
- Activate incident response team
- Notify security team
- Notify legal/compliance team
- Notify executive leadership (if critical)
- Assign incident coordinator
Step 2: Initial Assessment
- Determine if personal data involved
- Estimate number of affected individuals
- Assess data sensitivity
- Determine if breach occurred
- Classify severity level
Incident Assessment and Investigation
Investigation Process
Step 1: Gather Information
Information to Collect
- When did incident occur? (discovered vs. actual)
- How was incident discovered?
- What systems were affected?
- What data was involved?
- How many individuals affected?
- What was the attack vector?
- Is incident ongoing?
- What evidence is available?
Step 2: Analyze Impact
Impact Assessment
- Types of personal data exposed
- Number of affected individuals
- Sensitivity of data (health, financial, SSN)
- Likelihood of harm to individuals
- Potential for identity theft or fraud
- Reputational impact
- Legal and regulatory impact
Step 3: Determine Root Cause
Root Cause Analysis
- How did breach occur?
- What vulnerabilities were exploited?
- Was it human error, system failure, or malicious attack?
- Could it have been prevented?
- What controls failed?
Investigation Timeline
Critical Breaches:
- Initial assessment: Within 4 hours
- Detailed investigation: Within 24 hours
- Root cause analysis: Within 48 hours
High Severity:
- Initial assessment: Within 8 hours
- Detailed investigation: Within 48 hours
- Root cause analysis: Within 72 hours
Medium/Low Severity:
- Initial assessment: Within 24 hours
- Detailed investigation: Within 72 hours
- Root cause analysis: Within 1 week
Notification Requirements by Regulation
GDPR Requirements
Supervisory Authority Notification:
- Timeline: Within 72 hours of becoming aware
- Who: Data Protection Authority (DPA) in your jurisdiction
- What: Must include:
- Nature of breach
- Categories and approximate number of data subjects
- Categories and approximate number of records
- Likely consequences
- Measures taken or proposed
Individual Notification:
- When: If breach is likely to result in high risk to rights and freedoms
- Timeline: Without undue delay
- What: Must include:
- Nature of breach
- Contact information of DPO
- Likely consequences
- Measures taken or proposed
Exception: Not required if data was encrypted or other measures render data unintelligible.
CCPA/CPRA Requirements
Individual Notification:
- Timeline: In the most expedient time possible and without unreasonable delay
- Method: Written notice or email
- What: Must include:
- What happened
- What information was involved
- What you're doing
- What affected individuals can do
- Contact information
Attorney General Notification:
- When: If breach affects 500+ California residents
- Timeline: Same as individual notification
- Method: Written notice to Attorney General
- What: Same information as individual notice
Substitute Notice:
- If cost exceeds $250,000 or affects 500,000+ people
- Can use: Website posting, major media, email (if have email addresses)
State Privacy Laws
Common Requirements:
- Timeline: 30-60 days (varies by state)
- Method: Written notice or email
- Content: Similar to CCPA requirements
State-Specific Variations:
| State | Timeline | Threshold | Special Requirements |
|---|---|---|---|
| California (CCPA) | Without delay | Any breach | Attorney General if 500+ |
| Virginia (VCDPA) | 45 days | Any breach | - |
| Colorado (CPA) | 30 days | Any breach | - |
| Connecticut (CTDPA) | 60 days | Any breach | - |
| New York (SHIELD) | As soon as possible | Any breach | - |
Notification Timeline Comparison
| Regulation | Authority Notification | Individual Notification | Exception |
|---|---|---|---|
| GDPR | 72 hours | Without delay (if high risk) | Encrypted data |
| CCPA | N/A (unless 500+) | Without delay | - |
| VCDPA | N/A | 45 days | - |
| CTDPA | N/A | 60 days | - |
| CPA | N/A | 30 days | - |
Breach Notification Procedures
Notification Decision Tree
Step 1: Determine If Notification Required
GDPR Notification Decision
- Is this a personal data breach?
- Does breach pose risk to individuals?
- Must notify supervisory authority within 72 hours
- If high risk, must also notify individuals
- Document decision and reasoning
CCPA Notification Decision
- Was personal information breached?
- Was breach due to security failure?
- Must notify affected individuals
- If 500+ California residents, notify Attorney General
- Document decision and reasoning
Preparing Notifications
Supervisory Authority Notification (GDPR):
Required Information:
- Nature of personal data breach
- Name and contact details of DPO
- Likely consequences
- Measures taken or proposed
Template Structure:
1. Incident Summary
- Date and time of breach
- Date breach was discovered
- How breach was discovered
2. Nature of Breach
- Type of breach (unauthorized access, loss, etc.)
- Systems affected
- Attack vector
3. Data Involved
- Categories of personal data
- Approximate number of data subjects
- Approximate number of records
- Types of data (contact info, financial, health, etc.)
4. Likely Consequences
- Potential harm to individuals
- Risk of identity theft
- Risk of fraud
5. Measures Taken
- Containment actions
- Remediation steps
- Prevention measures
Individual Notification:
Required Information:
- What happened
- What information was involved
- What you're doing
- What they can do
- Contact information
Template Structure:
Subject: Important Notice Regarding Your Personal Information
Dear [Name],
We are writing to inform you of a security incident that may have affected your personal information.
**What Happened:**
[Brief description of incident]
**What Information Was Involved:**
[Types of data - be specific]
**What We're Doing:**
[Remediation steps taken]
**What You Can Do:**
[Steps individuals can take - credit monitoring, change passwords, etc.]
**For More Information:**
[Contact information]
We sincerely apologize for this incident and any inconvenience it may cause.
Notification Checklist
Step 1: Prepare Notifications
- Draft supervisory authority notification (GDPR)
- Draft individual notification
- Have legal team review notifications
- Ensure all required information included
- Prepare notification list (affected individuals)
Step 2: Send Notifications
- Send supervisory authority notification (within 72 hours for GDPR)
- Send individual notifications
- Send Attorney General notification (CCPA, if 500+)
- Use secure delivery methods
- Document notification dates and methods
Step 3: Follow-Up
- Monitor for questions or complaints
- Provide additional information if requested
- Update notifications if new information discovered
- Document all communications
Internal Response Team
Team Roles and Responsibilities
Incident Coordinator:
- Overall incident management
- Coordinate team activities
- Communication with leadership
- Timeline management
Security Team:
- Technical investigation
- Containment actions
- Forensic analysis
- System remediation
Legal/Compliance Team:
- Regulatory compliance
- Notification requirements
- Legal risk assessment
- Contract review (vendor breaches)
IT/Operations Team:
- System restoration
- Backup and recovery
- Infrastructure support
- Technical remediation
Communications/PR Team:
- Public communications
- Media relations
- Customer communications
- Internal communications
Executive Leadership:
- Strategic decisions
- Resource allocation
- External stakeholder communication
- Business impact assessment
Team Activation
When to Activate:
- Any confirmed or suspected breach
- Critical or high severity incidents
- Incidents involving sensitive data
- Incidents affecting many individuals
Activation Process:
- Initial reporter notifies incident coordinator
- Incident coordinator assesses severity
- Activates appropriate team members
- Establishes communication channels
- Sets up regular update meetings
Response Team Checklist
Step 1: Activate Team
- Notify incident coordinator
- Assess severity and activate appropriate team
- Establish communication channels (Slack, email, phone)
- Schedule regular update meetings
- Assign roles and responsibilities
Step 2: Coordinate Response
- Hold initial team meeting
- Establish incident timeline
- Assign investigation tasks
- Set deadlines for deliverables
- Document all decisions and actions
Step 3: Regular Updates
- Daily team updates (or more frequent for critical)
- Update incident timeline
- Track progress on tasks
- Adjust response plan as needed
- Communicate with leadership
Documentation Requirements
What to Document
Incident Details:
- Date and time of incident
- Date and time discovered
- How incident was discovered
- Systems affected
- Data involved
- Number of individuals affected
Response Actions:
- Containment actions taken
- Investigation steps
- Remediation measures
- Notifications sent
- Communications with stakeholders
Decision Making:
- Why breach determination was made
- Why notifications were or weren't sent
- Timeline decisions
- Resource allocation decisions
Documentation Timeline
During Incident:
- Document actions in real-time
- Maintain incident log
- Save all evidence
- Document all decisions
After Incident:
- Complete incident report
- Document lessons learned
- Update procedures
- Archive documentation
Documentation Checklist
During Incident
- Maintain incident log with timeline
- Document all containment actions
- Save system logs and evidence
- Document investigation findings
- Record all team decisions
- Save all communications
After Incident
- Complete incident report
- Document root cause analysis
- Record notification details
- Document remediation steps
- Create lessons learned document
- Archive all documentation
Post-Incident Review and Remediation
Post-Incident Review
Review Topics:
-
What Happened
- Timeline of events
- Root cause analysis
- Systems and data affected
-
Response Effectiveness
- Was response timely?
- Were procedures followed?
- What worked well?
- What could be improved?
-
Gaps Identified
- Security gaps
- Process gaps
- Training gaps
- Technology gaps
-
Remediation Plan
- Immediate fixes
- Short-term improvements
- Long-term enhancements
Remediation Actions
Immediate (Within 24-48 Hours):
- Fix identified vulnerabilities
- Restore affected systems
- Change compromised credentials
- Implement temporary controls
Short-Term (Within 1-4 Weeks):
- Implement additional security controls
- Update security policies
- Enhance monitoring
- Conduct security training
Long-Term (Within 1-6 Months):
- Implement comprehensive security improvements
- Update incident response procedures
- Enhance security architecture
- Regular security assessments
Post-Incident Checklist
Step 1: Conduct Review
- Hold post-incident review meeting
- Review incident timeline
- Analyze root cause
- Assess response effectiveness
- Identify gaps and improvements
Step 2: Develop Remediation Plan
- List immediate fixes needed
- Identify short-term improvements
- Plan long-term enhancements
- Assign remediation tasks
- Set deadlines
Step 3: Implement Remediation
- Execute immediate fixes
- Implement short-term improvements
- Plan long-term enhancements
- Monitor remediation progress
- Verify fixes are effective
Step 4: Update Procedures
- Update incident response procedures
- Update security policies
- Enhance training materials
- Update documentation
- Communicate changes to team
Prevention and Preparedness
Prevention Measures
Technical Controls:
- Encryption (in transit and at rest)
- Access controls and authentication
- Network segmentation
- Intrusion detection systems
- Data loss prevention (DLP)
- Regular security updates
- Vulnerability scanning
Administrative Controls:
- Security policies and procedures
- Employee training
- Access management
- Vendor management
- Regular security audits
- Incident response plan
Physical Controls:
- Secure facilities
- Access controls
- Device encryption
- Secure disposal
Preparedness Activities
Incident Response Plan:
- Written incident response procedures
- Defined team roles
- Communication templates
- Escalation procedures
- Regular plan updates
Training and Testing:
- Regular team training
- Tabletop exercises
- Simulated breach scenarios
- Lessons learned sessions
Monitoring and Detection:
- Security monitoring systems
- Log analysis
- Anomaly detection
- Regular security assessments
Preparedness Checklist
Step 1: Develop Incident Response Plan
- Create written incident response procedures
- Define team roles and responsibilities
- Create notification templates
- Establish communication procedures
- Define escalation procedures
Step 2: Implement Security Controls
- Implement encryption
- Set up access controls
- Deploy security monitoring
- Implement DLP tools
- Regular security updates
Step 3: Training and Testing
- Train incident response team
- Conduct tabletop exercises
- Test notification procedures
- Review and update plan regularly
- Learn from other organizations' incidents
Common Scenarios and Responses
Scenario 1: Phishing Attack Leading to Account Compromise
Situation: Employee falls for phishing email, attacker gains access to email account containing customer data.
Response:
- Immediate: Disable compromised account, reset password
- Investigation: Review email access logs, determine what data was accessed
- Assessment: Determine if personal data was accessed, how many affected
- Notification: Notify affected customers if data was accessed
- Remediation: Implement additional email security, phishing training
Scenario 2: Ransomware Attack
Situation: Ransomware encrypts systems containing customer data.
Response:
- Immediate: Isolate affected systems, assess scope
- Investigation: Determine if data was exfiltrated (not just encrypted)
- Assessment: If data exfiltrated, it's a breach requiring notification
- Notification: Notify if data was accessed/exfiltrated
- Remediation: Restore from backups, enhance security, improve backups
Scenario 3: Vendor Data Breach
Situation: Vendor notifies you they experienced a breach affecting your customer data.
Response:
- Immediate: Request detailed information from vendor
- Investigation: Assess what data was affected, verify vendor's assessment
- Assessment: Determine if notification required (you may be required to notify)
- Notification: Coordinate with vendor or notify yourself if required
- Remediation: Review vendor relationship, enhance vendor management
Scenario 4: Accidental Data Disclosure
Situation: Employee accidentally emails customer list to wrong recipient.
Response:
- Immediate: Request recipient delete email, verify deletion
- Investigation: Determine what data was disclosed, who received it
- Assessment: If recipient accessed data, may be breach requiring notification
- Notification: Notify if data was accessed and poses risk
- Remediation: Implement email controls, data loss prevention, training
Scenario 5: Lost or Stolen Device
Situation: Laptop containing customer data is lost or stolen.
Response:
- Immediate: Remote wipe device if possible, change credentials
- Investigation: Determine what data was on device, was it encrypted
- Assessment: If unencrypted and device accessible, breach requiring notification
- Notification: Notify if unencrypted data at risk
- Remediation: Implement device encryption, remote wipe capabilities
Implementation Checklist
Phase 1: Preparation (Week 1-4)
Develop Incident Response Program
- Create incident response plan
- Define incident response team
- Assign roles and responsibilities
- Create notification templates
- Establish communication procedures
- Set up incident tracking system
Implement Security Controls
- Implement encryption (in transit and at rest)
- Set up access controls
- Deploy security monitoring
- Implement data loss prevention
- Set up log collection and analysis
- Regular security updates
Phase 2: Training and Testing (Week 5-8)
Train Team
- Train incident response team
- Train all employees on incident reporting
- Conduct tabletop exercises
- Test notification procedures
- Review and update plan based on exercises
Phase 3: Ongoing Maintenance (Ongoing)
Maintain Program
- Regular security assessments
- Update incident response plan annually
- Conduct regular training
- Review and update security controls
- Monitor for security incidents
- Learn from industry incidents
Related Documentation
- Data Subject Rights Implementation Guide - How to handle user requests after a breach
- Third-Party Vendor Management Guide - Managing vendor breaches
- Privacy Risk Remediation Guide - Addressing security vulnerabilities
- Web Privacy Regulations Guide - Understanding notification requirements
Last Updated: 2025-01-17