Business a.m.

Incident or Breach? Meanings and responses

- MICHAEL IRENE, PhD Twitter: @moshoke Email: mike@mireneglob­alconsults.com.ng

GOOD BREACH MANAGE MENT and incident response systems form core aspects of a robust data protection framework. There is a wide range of ways to respond to a breach. In this week’s piece, I will highlight how to respond to breaches.

First, I must state that there is a difference between a breach and an incident. All breaches are incidents, but not all incidents are breaches. Only the privacy office, the IT team or the legal and compliance department­s within the company can declare a breach based on some specific triggers.

Breaches are events that place the lives and freedoms of individual­s at risks like identity theft, fraud and misreprese­ntation. In contrast, an incident is a situation which affects the confidenti­ality, integrity or availabili­ty of personal informatio­n and usually doesn’t lead to the loss of freedom. Most times, companies don’t have to report incidents to data protection authoritie­s, but they should record the event for lessons.

How can companies prepare for data breaches?

Companies don’t have to wait for breaches to happen. It’s about when they happen, how prepared is the company and its staff for the event. Preparedne­ss does not prevent incidents from happening, but it focuses on the people, process and technology that prevent a breach from happening. In other words, breach preparedne­ss focuses on measures a company can take to respond when prevention fails.

First, training comes to play here, which is pretty straightfo­rward and significan­t. Training exposes gaps in pre-incident and procedure plans. It creates ground for the security of customers, partners and employees. If the right personnel are trained about their duties when a breach does happen, it lowers the legal and notificati­on costs that might occur as a result of the breach. Training holds a strong case in the role of the breach management schemes of the preparatio­n phase of the data breach management procedure.

Much more than that, company stakeholde­rs should determine business functions that require in-depth training. For example, when there is a breach in a particular bank, how should customer care handle incoming calls and emails? What should they say to disgruntle­d or affected customers?

Each function of the business must know what and how they will handle incidents once they occur. This training can take different forms, and the content must be customised to meet the various demands of the multiple functions of the business. It can be virtual or through office intranet.

With regards to training too, various department­al heads must know what to say to the press. The CEO of the bank in question must choose her words carefully to avoid adding fodder to litigation­s.

The response to a breach is usually complicate­d.

However, a company that has positioned itself with the right trained staff, created the right process and acquired the right technologi­cal stack to handle various incidents will handle breaches and incidents with ease. Companies facing a potential deal with breaches detection, ensure that stakeholde­rs collaborat­e and know their roles, investigat­e, ask their legal teams to conduct analysis, address reporting obligation­s, and come up with a way to recover from the situation.

There are critical areas that stakeholde­rs must attend to broadly when there is a breach. When a breach happens, there is usually a colossal scampering for the right steps to take. Like I have said before in this space, preparatio­n would help the company take the right steps and then focus on securing the operation of the business. Because there is a breach doesn’t mean that business operations should stop. A sound breach management methodolog­y would maintain business continuity and prevent the company from running at a loss and delivering products and services to the customers.

The company should also put notificati­on strategy into its breach response and the cost implicatio­ns. Usually, companies can communicat­e via email, post or use social media platforms. The company should look for a cost-effective way to reach the affected customers.

And the final issue would be to focus on locating the vulnerabil­ities, fixing it immediatel­y by working with the various functions of the business, primarily where a weakness existed, and work on the best way to strengthen the gaps.

These are no specific steps. However, companies must understand the difference between an incident and a breach and be prepared to handle violations when they do happen.

*Dr. Irene is a Data Protection Consultant and writes in from London.

 ??  ??

Newspapers in English

Newspapers from Nigeria