Data Breach Checklist
A checklist of 12 steps for global in-house counsel to consider for the first hours of responding to a data breach.
A checklist of 12 steps for global in-house counsel to consider for the first hours of responding to a data breach.
This is a sample data breach checklist.
Privacy data breach response policy and crisis management policy.
Check out this sample policy developed by Exterro. In this resource we take a look at a basic incident and breach management process.
Read this article from Exterro to verify that your breach response solution can help you automatically respond to incidents by using the checklists included.
This checklist of issues and questions can help you develop your data breach after-action report (AAR) to account for how your organization detects, responds, and recovers from a breach.
This sample policy specifies a company's procedures for handling data breaches.
Data risk was once thought of as a technical challenge. However, the onslaught of data breach and data privacy legislation, and subsequent litigation have changed this outlook. There is one activity that everyone is aware of which, if well-executed, can lower technical, legal, and privacy risks and increase compliance: a data retention/deletion program. Check out this whitepaper from Exterro to learn more about data retention programs.
In this multi-jurisdictional guide, explore an overview of key legal issues, rules and developments regarding data protection across a range of jurisdictions.
Some topics include the rapid evolution in data laws and more.