Managing Your Message Before, After & During a Data Breach

Recorded:  November 19, 2014
Duration: 1 hour
CLE: 1 credit (check your local bar rules)

Register

THE SPEAKERS

MelanieThomas

How, when and to whom you communicate with in the time surrounding a data breach can make the difference between a manageable event that makes your security stronger,  and one that does devastating long-term damage to your reputation and results in costly fines and protracted litigation.

To discuss best practices in developing and sharing your message we enlisted the expertise of Melanie Dougherty Thomas, founder and managing director of Inform LLC, a global integrated solutions firm in Washington, DC. Thomas shared insights she has developed during her 20 years in marketing and communications, which included work in broadcasting, public relations, branding and public policy. She works with clients on strategy, media relations, crisis communications and integrating new media tools into their communications programs.

ScotGanowJoining Thomas was attorney Scot Ganow with the Ohio-based law firm of Faruki Ireland & Cox. Prior to starting his legal career Scot spent 10 years in the corporate compliance field, where he served as chief privacy officer in the healthcare sector. He now specializes in counseling clients in the areas of privacy and data security law and is a certified information privacy professional. He earned is J.D. from the University of Dayton Law School.

 

THE CORE CONCEPTS

Pre Breach

Developing your information privacy and security reputation

Establishing key relationships with regulators and others

Documenting and communicating your policy on the collection, use, storage, transfer and safeguarding of information

Forming an Incident Response Team, comprised of internal and external resources

Drafting, Implementing and Testing an Incident Response Plan, to include messaging

During the Breach

Communication strategies

Social media and other outlets

Cardinal sins/No-no’s of breach communication

After the Breach

After Action Reports and lessons learned

Follow up on outstanding issues

Changes to polices and plan to address issues and lessons learned

Potential communications and promotions, if applicable, to protect your brand and engender trust