10.07.2015 Views

1E9Ct5D

1E9Ct5D

1E9Ct5D

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

• Staff dedicated to checking audit logs for red flags;• Management and leadership updated frequently on security issues;• Staff dedicated to daily monitoring of company email and systems;• Document the exceptions after approval; and• Routine audits of and onsite visits to third party vendors.D. Insurance: Get Covered.Companies must ensure they have appropriate data breach insurance coverage. Priorto experiencing a known data breach, companies should have an experienced databreach insurance attorney assess whether they have adequate and appropriate databreach coverage, considering the nature/size of the business and financial/legalexposure. As a general rule, adequate coverage will require purchasing a separatedata breach policy or a data breach endorsement to an existing policy. 34IV.Best Practices in Responding to a Data Breach.Companies should have a breach response action plan in place long before a databreach in order to reign in costs and continue to do business as usual to the extent34 For a thorough discussion of the importance and types of data breach and cybersecurity insurance, seeIt Is Bound To Happen, Track 3; see also Bill Latham, Does Your Data Breach Insurance PolicyMeasure Up?, The Hytech Lawyer Blog (Dec. 4, 2014), http://hytechlawyer.com/ (last visited Jan. 13,2015).March 6, 2015 21 © 3-6-2015 ALFA International Business Litigation P.G.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!