{"id":5674,"date":"2018-10-03T17:42:22","date_gmt":"2018-10-03T21:42:22","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/?p=5674"},"modified":"2018-10-03T17:42:22","modified_gmt":"2018-10-03T21:42:22","slug":"4-things-you-should-include-in-your-data-breach-response-plan","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/2018\/10\/03\/4-things-you-should-include-in-your-data-breach-response-plan\/","title":{"rendered":"4 Things You Should Include In Your Data Breach Response Plan"},"content":{"rendered":"<p>4 Things You Should Include In Your Data Breach Response Plan<br \/>\n\u2013 By JAKE OLCOTT<\/p>\n<p>Data breach response pages can be tens to hundreds of pages long depending on the size of your organization and the criticality of your data. Following a set data breach response template isn\u2019t advisable because different organization have different infrastructure and their unique scenario.<br \/>\nThe following are four must have points for a data breach response plan:<\/p>\n<p>1. The type of data that constitutes a data incident.<br \/>\n\u2022 Incidents or breaches that involve legally protected information such as PII or PHI which requires immediate notification to affected users.<br \/>\n\u2022 Incidents or breaches that represent a small material loss to the company which may not require notification to stakeholders.<br \/>\n2. The parties responsible during a data breach.<br \/>\n\u2022 IT\/IT Security Department<br \/>\n\u2022 Legal Department<br \/>\n\u2022 Communications Department<br \/>\n\u2022 HR Department<br \/>\n\u2022 Executives<br \/>\n3. The internal escalation processes:<br \/>\nWhen a data incident occurs on your network, you need a rock-solid internal escalation process established for escalating the incident up through your organization.<br \/>\n4. The external escalation process:<br \/>\nAside from escalating a data incident inside your organization, you also need to include the external escalation process in your data breach response plan.<\/p>\n<p>Reference:<br \/>\n1) JAKE OLCOTT, \u201c4 Things You Should Include In Your Data Breach Response Plan,\u201d February 16, 2017 ,\u00a0<a href=\"https:\/\/www.bitsighttech.com\/blog\/data-breach-response-plan-4-things-include\" rel=\"nofollow\">https:\/\/www.bitsighttech.com\/blog\/data-breach-response-plan-4-things-include<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>4 Things You Should Include In Your Data Breach Response Plan \u2013 By JAKE OLCOTT Data breach response pages can be tens to hundreds of pages long depending on the size of your organization and the criticality of your data. Following a set data breach response template isn\u2019t advisable because different organization have different infrastructure [&hellip;]<\/p>\n","protected":false},"author":20413,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[715709],"tags":[],"class_list":{"0":"post-5674","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-05it-strategy","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/posts\/5674","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/users\/20413"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/comments?post=5674"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/posts\/5674\/revisions"}],"predecessor-version":[{"id":5675,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/posts\/5674\/revisions\/5675"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/media?parent=5674"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/categories?post=5674"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/tags?post=5674"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}