Data Breach Response Policy

Data Breach Response Policy
The worst time to develop a plan of action is when in middle of a serious emergency situation. It is even worse when trying to come up with an incidence response plan to address a cyber-breach. However, with an effective data breach response policy in place, an organization can overcome the stress that comes with having to deal with the reputational damage and losses that comes with such an incident (Fowler, 2016). In today digital space, data breach is inevitable as modern attackers use sophisticated tools to attempt breaching information systems which means that organizations should always plan for the worst likely scenario. According to Fowler (2016), having a data breach response policy in place ensures that individuals and organizations are well prepared and also understand how to deal with the worst likely scenario in the event of an unexpected data breach. This discussion gives an overview of a data breach response policy, the reasons behind its development, how it is applied and the literature review about it.
Overview of the Policy
A data breach response policy can be described a collection of actions that assist individuals or organizations to detect as well as respond to various cyber security incidents in a well-planned, coordinated and timely manner. A data breach response policy is supposed to cover all electronic devices and computer systems. Having this policy in place allows individuals and organizations to have well defined process of reporting suspected theft of data or incidences of data breach (IGI Global, 2018). It also outlines the necessary steps to take when responding to an already confirmed data breach or theft.
Reasons for its Development
This policy is often developed to establish a framework under which a breach response process can be undertaken. When the policy is developed, it aims to give a clear definition of where it applies and the specific circumstances this is supposed to happen, among other characteristics such as staff roles and responsibility in response to the data breach (Gonzalez & Kemp, 2019). By ensuring that the policy is well publicized and availed to all relevant personnel within a given institution, then it is able to serve its sole purpose of its establishment which is to enhance security protection and data privacy.
How the Policy is applied
The data breach response policy mandates any individual suspecting that a data breach has occurred to immediately give a description of what exactly occurred to the established reporting authority within a given organization. Once the data breach has been identified, immediate efforts begin to establish the process of responding to the identified data breach. In most cases, an incident response team is established to handle the identified data breach. This team often comprises members from different departments within an organization such as the IT infrastructure, applications, finance, and human resources, among others. Other relevant members of this team are the units or departments directly affected by the identified data breach.
Once the team has been established and the data beach confirmed, the next plan of action is to establish measures that respond to the breach effectively. This involves analysis the breach with the forensic team with the aim of establishing the main source of this breach and the likely motive behind it. In addition, cyber insurance may also be involved to provide forensic investigators with access to determine how the identified breach occurred as well as the type of data affected. Another important step of the application process of this policy is the development of a communication plan. By working with the communications and human resource departments, it becomes easier for the investigating team to gather clues on how the data breach occurred as well developing the right framework to respond to the breach. By combing and coordinating all these activities, it becomes easier to apply the data breach response policy effectively.
Application of the Policy within a National and International Level
The growing sophistication and frequency of cyber threats has necessitated the need to establish formal frameworks to respond to the rising cases of data breaches at the national and international levels. As countries engage in continuous competition against criminal networks and strategic adversaries, cyberspace has been emerged as a common tool used to launch attacks against states (Experian, 2019). This implies that cyber tools are now being used to undermine a given countries democracy, economy and other sectors. For this reasons data breach response policy is an effective tool for ensuring that countries are well prepared to deal with these threats both at a national and international level. At the national level, the data breach response policy can be used to determine how a country can defend its cyberspace through protection of networks and systems of key national information technology infrastructures. At the international level, the policy is use by both private organizations and governments to put in place effective measures that ensure the right policy frameworks are in place to deal with any emerging cyber threats at a global level. This may involve corporation between countries in terms of sharing of information when responding to already identified data breach.
Literature Review on the Data Breach Response Policy
With increased incidences of data breaches, researchers are developing a keen interest on the subject and in particular in regards to data breach response policy. Today there are numerous research studies detailing various aspects about the policy. For instance Fowler (2016) argues that every modern business should have a data breach response policy in place to deal with any unexpected breach as this would help minimize the impact it would have on damaging the organizations brand and reputation. Fowler (2016), states that this policy should often be subjected to regular tests to establish its effectiveness within an ever changing cyber environment. As such, it is important to have this policy in place as it helps organizations detect any incidences of a data breach early and take swift action to contain the likely damage arising from the breach.
In spite of the many reports detailing the serious consequences that come with a data breach, some studies have suggested that the level of preparedness among institutions is still low. Fowler, Pogue and Hanley (2016) indicate that companies are failing to keep up with the regulatory landscape and evolving threats existing in today’s cyberspace. However, efforts continue to be made to encourage originations to implement data breach response policy as part of their response plans.

Conclusion
From the foregoing, data breach has become inevitable today as modern attackers use sophisticated tools to attempt breaching information systems. A data breach response policy is a plan of actions that assist individuals or organizations to detect as well as respond to various cyber security incidents in a well-planned, coordinated and timely manner. Having a data breach response policy in place is important because it helps deal with any unexpected breach as this would help minimize the impact it would have on damaging the organizations brand and reputation.

References
Experian. (2019). Data Breach Response Guide. Retrieved from https://www.experian.com/assets/data-breach/white-papers/experian-2017-2018-data-breach-response-guide.pdf
IGI Global. (2018). Cyber security and threats: concepts, methodologies, tools, and applications. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA).
Fowler, K. (2016). Developing a Computer Security Incident Response Plan. Data Breach Preparation and Response, 49–77. doi: 10.1016/b978-0-12-803451-4.00003-4
Fowler, K., Pogue, C., & Hanley, P. (2016). Restoring Trust and Business Services After a Breach. Data Breach Preparation and Response, 187–215. doi: 10.1016/b978-0-12-803451-4.00008-3
Gonzalez, J. J., & Kemp, R. L. (2019). Cybersecurity: current writings on threats and protection. Jefferson, NC: McFarland & Company, Inc., Publishers.

Published by
Essays
View all posts