Who to Contact in Case of a Data Breach?

Who to Contact in Case of a Data Breach?

Discovering that your organization has experienced a data breach is one of the most disorienting moments a business leader can face. The instinct is often to gather more information before taking action — to wait until the full picture is clear before making calls, issuing notifications, or engaging outside help. That instinct, however understandable, is one of the most common and most costly mistakes organizations make in the first hours after a breach is discovered. The legal deadlines that govern breach notification do not pause while you investigate. The regulators who will scrutinize your response will assess not only what you did but how quickly you did it. And the decisions made in the first twenty-four to forty-eight hours often determine the trajectory of everything that follows.

This post is designed to serve as a practical guide to who you need to contact in the event of a data breach, in roughly the order in which those contacts should be made. It is not a substitute for legal counsel — every breach is different, and the specific obligations that apply to your organization depend on your industry, the nature of the data involved, the jurisdictions where your users and customers are located, and the facts of the incident itself. But it provides a framework for understanding the response ecosystem and why each component of it matters.

First Contact: Legal Counsel

The very first call after discovering a potential data breach should be to your legal counsel — specifically, an attorney with experience in data breach response and privacy law. This is not merely a precaution. It is a decision with direct legal consequences for how the breach response unfolds, because the manner in which you conduct the investigation, document your findings, and communicate about the incident will determine, in significant part, your exposure in subsequent regulatory proceedings and civil litigation.

The most important reason to engage legal counsel before taking almost any other formal action is attorney-client privilege. When an organization retains outside counsel to oversee the breach response and direct the forensic investigation, the investigation and its findings may be protected as attorney-client communications and attorney work product, shielding them from discovery by plaintiff’s attorneys in class action litigation and from compelled disclosure to regulators. If the forensic investigation is conducted independently — by your IT team, a third-party vendor acting outside the scope of a legal engagement, or under any other arrangement that does not establish an attorney-client relationship — the resulting reports and findings may be fully discoverable. The difference between a privileged and a non-privileged forensic report can be enormous in both practical and financial terms.

Beyond the privilege issue, your attorney will immediately begin assessing your notification obligations under applicable law, helping you understand the deadlines you are working against before you have completed the investigation. They will advise you on what communications about the breach should and should not be made, and to whom, during the early stages of the response — because premature or inaccurate public statements can create additional legal exposure. They will help you convene the right internal and external team and ensure that each component of the response is proceeding in a legally sound manner. If you do not already have a relationship with breach counsel, the time to find one is now, not in the middle of an incident.

Activating Your Internal Response Team

Simultaneously with engaging legal counsel, you need to activate your internal incident response team. Every organization that handles personal data should have a designated incident response team identified in advance, with defined roles and clear escalation procedures. If that team is not yet in place, the response to an actual breach will require improvising it — which is possible, but significantly slower and less effective than executing a pre-existing plan.

Your internal response team should include your senior technology and information security leadership, who are responsible for containing the breach, preserving digital evidence, and beginning the forensic investigation under the direction of legal counsel. It should include executive leadership — the CEO, COO, or equivalent — who have the authority to make decisions about resources, communications, and strategy, and who need to be informed and engaged from the outset. Your general counsel or head of legal should be directly involved in coordinating with outside counsel. Your finance leadership needs to be notified because of the financial implications of the response, including insurance claim management. Your human resources leadership should be involved if employees are among the affected individuals or if the incident may have involved insider conduct.

Critically, your internal communications during the early stages of the breach response should be conducted with discipline and care. Employees should be instructed not to discuss the incident outside the response team, not to speculate about causes or scope, and not to communicate about the breach through unprotected channels such as personal email or messaging applications. Well-intentioned but carelessly worded internal communications have been discovered in litigation and have significantly complicated an organization’s legal position. Your outside counsel will advise on communications hygiene from the earliest stage of the engagement.

 Engaging Your Cyber Insurance Provider

If your organization carries cyber insurance — and it should — notifying your insurer is one of the earliest required actions in a breach response, and it must happen promptly. Most cyber insurance policies include notice requirements that obligate the policyholder to report a potential covered incident within a specific timeframe, often as short as a few days from discovery. Failure to provide timely notice is one of the most common grounds on which insurers dispute or deny coverage, and the cost of a coverage denial in a significant breach can be substantial.

Before you call your insurer, review your policy — or have your attorney review it — to understand the specific notice requirements, any approved vendor requirements for forensics and legal services, and the scope of coverage for the type of incident you are dealing with. Many cyber insurance policies designate a panel of approved forensic investigation firms and legal counsel whose fees are covered without dispute. Using vendors outside the panel does not necessarily mean your costs will not be covered, but it may create additional friction in the claims process. If your pre-existing breach counsel is not on your insurer’s panel, your attorney and the insurer will need to work out the engagement arrangement quickly.

Your cyber insurance policy may cover forensic investigation costs, legal fees for the breach response, notification and credit monitoring costs for affected individuals, regulatory fines and penalties (subject to applicable law — some jurisdictions prohibit insuring certain types of regulatory penalties), litigation defense costs, crisis communications costs, and business interruption losses. Understanding the scope of your coverage at the outset of the response helps you make better decisions about which vendors to engage, at what cost, and under what structure.

Retaining a Forensic Investigation Firm

A qualified digital forensics and incident response (DFIR) firm is an essential component of the breach response team. The forensic investigation is what answers the questions that drive all subsequent decisions: what systems were accessed or compromised, what data was affected and how many individuals are implicated, when did the intrusion begin, how did the attacker gain access, is the threat actor still present in the environment, and has the threat been fully contained. Without reliable answers to these questions, you cannot assess your notification obligations, you cannot make accurate disclosures to regulators and affected individuals, and you cannot remediate the vulnerability that caused the breach.

As discussed above, the forensic investigation should be structured from the outset under the direction of your legal counsel, to preserve the potential for privilege over the investigation and its findings. In practice, this means that the engagement letter for the forensic firm should be structured through outside counsel, and communications about the investigation’s findings should be directed to and through counsel. This structure does not impede the technical investigation — the forensic team does exactly the same work — but it creates the legal architecture that may protect the resulting report from discovery.

Evidence preservation is a critical early priority. Before any remediation steps are taken — before systems are wiped, restored from backup, or shut down — the forensic team must ensure that relevant digital evidence is preserved. Failing to preserve evidence can result in an inability to understand the scope of the breach, and it can give rise to spoliation claims in subsequent litigation if evidence that should have been preserved is found to have been destroyed. Your legal counsel will issue a litigation hold at the outset of the response, and the forensic team will work to capture and preserve relevant evidence before remediation begins.

Notifying Federal Regulators

The federal regulatory notification landscape for data breaches is sector-specific, and the agencies you must notify — and the timelines within which you must do so — depend on your industry and the nature of the data involved.

Healthcare organizations covered by HIPAA must report breaches of unsecured protected health information to the HHS Office for Civil Rights. For breaches affecting five hundred or more individuals, notification to OCR must occur within sixty days of discovery of the breach, and notification to prominent media outlets serving the affected state or jurisdiction is also required. Notification to the affected individuals must also occur within sixty days of discovery. Smaller breaches affecting fewer than five hundred individuals must be reported to OCR on an annual basis. OCR takes breach reports seriously, investigates a substantial portion of reported breaches, and has the authority to impose civil money penalties that in major cases have reached into the millions of dollars.

Financial institutions regulated by federal banking agencies — including banks, credit unions, savings institutions, and their service providers — are subject to the Computer-Security Incident Notification Rule issued jointly by the OCC, Federal Reserve, FDIC, and NCUA. Under this rule, banking organizations must notify their primary federal regulator within thirty-six hours of determining that a notification incident — defined as a computer-security incident that has materially disrupted or degraded the institution’s ability to carry out banking operations — has occurred. Bank service providers have their own notification obligation to affected banking organization customers. This thirty-six-hour window is one of the shortest regulatory notification deadlines in any sector, and it requires that financial institutions have well-developed incident response capabilities that can move very quickly.

Public companies subject to SEC jurisdiction must comply with the SEC’s cybersecurity disclosure rules, which require disclosure of material cybersecurity incidents on Form 8-K within four business days of determining that the incident is material. The materiality determination is a legal judgment that requires careful analysis — it is not defined solely by the size of the breach or the number of individuals affected, but by whether the incident is something a reasonable investor would consider important to their investment decision. SEC disclosure counsel and breach response counsel need to work closely together on this determination, which must be made quickly and documented carefully.

For businesses with operations or customers in the European Union, the GDPR requires notification to the relevant supervisory authority within seventy-two hours of becoming aware of a personal data breach, where the breach is likely to result in a risk to the rights and freedoms of individuals. Where the breach is likely to result in a high risk to individuals, notification to affected individuals is also required without undue delay. Seventy-two hours is an extremely short window, and it runs from the moment the organization becomes aware of a potential breach, not from when the investigation is complete. Organizations subject to GDPR must have response capabilities in place that can make a preliminary notification to the supervisory authority quickly, with additional information to follow as the investigation develops.

Notifying State Regulators and Attorneys General

Beyond federal regulators, most significant data breaches trigger notification obligations to state attorneys general and, in some cases, state regulatory agencies. All fifty states and the District of Columbia have enacted breach notification laws, each with their own scope, timelines, content requirements, and regulatory filing obligations. In a breach affecting individuals across multiple states, managing these parallel and sometimes inconsistent requirements is one of the most operationally complex aspects of the response.

Many states require notification not just to affected individuals but also to the state attorney general, the state consumer protection agency, or another designated authority. New York requires notification to the Attorney General, the Department of State, and the Division of Consumer Protection. California requires notification to the Attorney General when the breach affects more than five hundred California residents. The New York Department of Financial Services requires notification by regulated entities within seventy-two hours of a breach involving nonpublic information. Managing these multi-state regulatory filings correctly and on time requires careful tracking, and your breach counsel should have systems in place to manage this process.

State attorneys general have become significantly more active in data breach enforcement in recent years, particularly following breaches that affect large numbers of residents of their state. Multi-state attorney general investigations — in which the attorneys general of multiple states coordinate a joint inquiry — have become a standard response to major consumer data breaches, and they can result in settlement agreements that include substantial penalties, mandatory corrective measures, and ongoing monitoring obligations. The quality of your initial breach response — how quickly you notified, how completely you investigated, what remediation steps you took — will be scrutinized closely in these investigations.

 Considering Law Enforcement Notification

Notifying law enforcement following a data breach is not legally required in most circumstances, but it is worth considering seriously and discussing with your legal counsel. The FBI’s Cyber Division and local field offices investigate cybercrime, and early engagement with law enforcement can in some cases assist with identifying the threat actor, recovering stolen data or assets, and preventing further harm. The FBI has access to intelligence and investigative resources that private organizations and their forensic teams do not, and early reporting can allow the FBI to provide assistance that is otherwise unavailable.

The Cybersecurity and Infrastructure Security Agency (CISA), the federal agency responsible for national cybersecurity resilience, accepts voluntary breach reports and can provide technical assistance to affected organizations. CISA has developed significant expertise in threat actor tactics and can sometimes provide information about the nature and origin of an attack that helps the forensic investigation move more quickly. Reporting to CISA is voluntary, and the information shared with CISA is protected from disclosure under certain provisions of federal law.

The decision to engage law enforcement involves strategic considerations that should be worked through carefully with counsel. Law enforcement engagement introduces additional parties into a situation that is already legally complex, and the timing and manner of engagement should be deliberate. If the breach involves potential criminal conduct by employees — insider theft, for example — law enforcement engagement raises additional legal questions about concurrent civil and criminal proceedings that require careful management.

Notifying Affected Individuals

Notifying the individuals whose personal information was compromised is among the most legally consequential obligations in a breach response, and it must be done correctly. The notification letters sent to affected individuals are not merely a compliance exercise — they are legal documents that will be reviewed by regulators, examined in litigation, and scrutinized by the plaintiff’s bar for any inaccuracies, omissions, or misleading statements. They must be drafted with care, under the supervision of legal counsel.

State breach notification laws specify the content that notification letters must contain, which typically includes a description of the breach and when it occurred, a description of the categories of personal information involved, the steps the organization has taken in response, steps the affected individual can take to protect themselves, and contact information for the organization and relevant consumer protection agencies. Some states require including specific language about the individual’s rights under state law, referrals to credit reporting agencies, and offers of credit monitoring or identity protection services.

The timing of individual notification must comply with the shortest applicable deadline across all jurisdictions in which affected individuals reside. Your breach counsel will calculate this timeline based on the state distribution of affected individuals and will ensure that notifications are sent within the required window. Where individual contact information is unavailable for some affected individuals, state laws typically provide for substitute notice through website posting or, for very large breaches, media notice — but these alternatives have their own requirements and limitations.

 Notifying Contractual Partners

In addition to regulatory and individual notification obligations, your organization likely has contractual notification obligations to customers, vendors, and business partners. Enterprise customers who entrusted you with their data or the data of their own customers have a direct interest in knowing about a breach, and their contracts with you almost certainly contain breach notification provisions specifying how and when such notification must occur. Failing to comply with contractual notification obligations can give rise to breach of contract claims in addition to the other legal exposure already in play.

If your organization processes personal data on behalf of customers as a service provider or data processor — a SaaS company processing customer data, for example, or a payment processor handling transactions — your customers may have their own regulatory notification obligations that are triggered by your breach. Getting accurate information to those customers quickly, so that they can comply with their own obligations, is both a contractual and a reputational imperative. If your breach originated with a third-party vendor, that vendor has obligations to notify you, and you may have claims against them that need to be preserved from the earliest stages of the response.

The Importance of Advance Preparation

Every element of the breach response described in this post is more difficult, more expensive, and more legally risky when it is improvised under pressure in the middle of an actual incident. Organizations that have invested in advance preparation — developing and testing an incident response plan, establishing relationships with breach counsel and forensic providers, ensuring that cyber insurance coverage is appropriate and current, training the response team, and conducting tabletop exercises that simulate a breach scenario — are dramatically better positioned to respond effectively when an incident occurs.

An incident response plan does not need to be a lengthy or complex document. It needs to clearly identify who does what, in what order, with what resources, and under what authority, when a breach is suspected or confirmed. It needs to include current contact information for all key internal and external parties. It needs to address how decisions will be made when senior leaders are unavailable. And it needs to be tested and updated regularly, because the regulatory landscape, the threat environment, and the organization’s own operations change continuously.

Conclusion

A data breach response is a team effort involving legal counsel, technical experts, internal leadership, insurers, regulators, and ultimately the affected individuals themselves. The sequence in which you engage these parties, and the care with which you manage communications and decisions throughout the process, will determine the legal, regulatory, and reputational outcome of an incident that no organization wants to face but that every organization handling personal data must be prepared for.

The organizations that manage data breaches most effectively are those that treated preparation as a priority before the breach occurred and that moved quickly, deliberately, and with experienced legal guidance once it did. If your organization has not yet developed an incident response plan, established a relationship with breach counsel, or assessed the adequacy of your cyber insurance coverage, the time to do those things is now — before you need them.

If you have experienced a breach and need immediate assistance, or if you want to put the right preparation in place before one occurs, contact our firm today. We are ready to help you respond.



Leave a Reply