To avoid the fallout that organizations face after a cyberattack—which could range from public mistrust and volatile stock positions to regulatory penalties and/or large ransom payouts—organizations are best suited ensuring that their breach response and notification processes are ready to kickoff at a moment’s notice. Check out this sample policy developed by Exterro. In this resource we take a look at a basic incident and breach management process.
Members-only access
To access the full resource, you must be a member. Already a member? Login to unlock.
Login
Not an ACC member?
Gain access to a comprehensive collection of global resources for in-house counsel
Sign up for a 30-day trial
Region:
United States
,
Global
The information in any resource collected in this virtual library should not be construed as legal advice or legal opinion on specific facts and should not be considered representative of the views of its authors, its sponsors, and/or ACC. These resources are not intended as a definitive statement on the subject addressed. Rather, they are intended to serve as a tool providing practical advice and references for the busy in-house practitioner and other readers.