Data breaches are becoming increasingly common, according to many reports. While companies should strive to minimize their exposure, they should also have plans for dealing with incidents when they do occur. Organizations could especially benefit from planning how they will resume operations and how they will handle the process of notifying their customers.
If a network breach occurs “late on a Friday, you want to be operational in hours, not days,” said Chris Shenefelt, an executive vice president at Intersections Inc., which helps companies manage the resolution process. Shenefelt spoke at a recent panel on data breaches at a conference sponsored by the Online Trust Alliance.
The first step in planning is to identify who in the company will be responsible for various aspects of breach response, including legal issues, IT, and public relations, agreed panelists.
Companies should also reach out to third-party providers of breach-resolution services before a breach occurs. For example, management should identify one or more credit monitoring or fraud prevention providers that the company wants to work with to offer assistance to customers in the event of a breach, said Shenefelt. Companies should, at a minimum, offer credit reports from all three major reporting agencies as well as at least a year of credit monitoring, he said. Customers should have at least 90 days to enroll in the program.
In most cases, organizations should also offer credit scores and identity theft insurance, he said. Scores do not necessarily help prevent fraud. Insurance, in Shenefelt’s experience, rarely results in generous compensation for incidents. But companies should consider such offerings because “customers really like them.”
Many companies choose data breach services and products based mainly on overall price, said Anne Wallace, president of the nonprofit Identity Theft Assistance Corporation. But organizations could also benefit from having more expensive offerings available for high-net-worth clients or as a public-relations gesture for all customers. The choice will depend on the company’s overall customer-service approach.
Intersections has provided customers with up to 20 years of monitoring, said Shenefelt.
Strong communication is also important in the resolution process, say many experts. Many vendors and other sources offer templates for notification letters, a significant communications component.
Companies should choose their letters before a breach, said Shenefelt, having them “90 percent complete” with only breach details to enter. The letter will inform the customer about the breach and about whatever resolution services the company is providing in response.
Letters should describe at least one product offered to consumers, Shenefelt said. They should also clearly state the kind of information, including personal data, customers may need to provide to enroll, he said. The latter can make the process more seamless, he said, and prevent potentially awkward situations in which customers find themselves unexpectedly asked to provide data that may have just been mishandled.