Preview

Unit 6 Analysis Of The Breach Notification Law Letter

Satisfactory Essays
Open Document
Open Document
254 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 6 Analysis Of The Breach Notification Law Letter
Robert Jones
Unit 6 Assignment Analysis of the Breach Notification Law Letter
2/9/2015
IS3350
Mr. Pragel

Breach notification law letters have contributed to the importance of information security throughout every business level of an organization. Every department of a corporation has the responsibility to detect, monitor, investigate and report breaches; whether a data or physical breach. Reports of breaches help not only IT security officers maintain awareness, but also every other member of an organization as well. Breaches cause reputational damage to organizations, and each one can have major consequences to the corporation. Breach notification letters lead to awareness and attention that may have gone unnoticed or unknown by other companies. These letters must follow the following guidelines when being written:
Take responsibility and apologize.
Be clear and unassuming. Most people today understand identity theft, but data breach is still a foreign word. Explain what happened, be transparent and honest. Write at a simple understandable level that everyone can understand.
Explain the customer options without scaring them. Provide them a phone number and resources if they are concerned and want assistance.
Remember that the customer is a single person and should feel that the company is making a genuine attempt to protect them.
Be leery of red flags. Letters should be sent to someone outside the company and ask how it reads to them. Does it scare them or do they feel some type of comfort?
Explain how the company is ensuring that this type of incident doesn’t happen again.
Apologize again.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    A breach notification letter is a good thing, as it means the company is doing something. If one of these letters happens to find its way to you, it means your PII was stolen. If it happens to be a company that has a records department, they would have to identify whose and what records were compromised. Also the CFO has to approve the letter of breach that will be sent to customers, and also the legal team has to proof it and okay it. With a data breach in the state of Wisconsin, the letter must include the type of data that might have been stolen and…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    You should always treat your client as an individual, with individual needs. And their privacy should be respected at all times.…

    • 809 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    Discovery helps to analyze and understand how breaches occur. If this company can reduce system vulnerabilities can reduce the risk and impact of threats, to the system significantly.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Our business relies on getting our customer to know and trust us during the initial stage of our relationship such that they will continue working with us for the long term. To accomplish this we must treat our clients with respect and provide a high level of service that is unattainable from another company. Our clients are placing a high level of trust in us and we must honor that commitment by ensuring no confidential information is disseminated outside our company or to those inside the company who may have a conflict of interest. Above all else we will be professional with our clients and work to the best of our ability to provide them with unrivaled service.…

    • 1256 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Information that is stored in an organisation has to follow the security and confidentiality procedures. For example finances, customer’s and employee’s details should be secured and only certain members of staff should be able to access physical and electronic data unless you have been given authorisation. If information gets into the wrong hands it could have serious consequences and might lead to legal action.…

    • 777 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Security Breach Plan Paper

    • 1576 Words
    • 7 Pages

    If a breach occurs a reminder memo should be sent out companywide to refresh the employees of the policies and procedure that should be followed. The annual trainings are to be required computer modules that employees must do on their own time by a set date each year, once the employee completes this module a notification will be sent to his/her manager that it has been completed. If there are changes that occur, a memo should be delivered to all employees outlining the change as well as providing them with an outlet to ask any questions they may have regarding the changes. Any employee that is known to have compromised PHI or any company confidential information will be reprimanded and depending on the severity of the breach can be fired and even…

    • 1576 Words
    • 7 Pages
    Better Essays
  • Good Essays

    My strategy was to ask directly for the customer service manager to discuss the situation. I would…

    • 980 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Week 10

    • 1757 Words
    • 24 Pages

    To elicit the right response from the customer How can we find ways to let our customers…

    • 1757 Words
    • 24 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Human Resources 590

    • 533 Words
    • 2 Pages

    Provide information Provide prompt and accurate information Customers often request to speak to someone else 2…

    • 533 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Data breaches that could lead to identity theft, by sector - the danger of data breaches are of particular importance for organizations that store and manage large amounts of personal information. Not only can compromises that result in the loss of personal data undermine customer and institutional confidence, result in costly damage to an organization’s reputation, and result in identity theft that may be costly for individuals to recover from, they can also be financially debilitating to organizations.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Every company likes to advertise its customer service, but few live up to their promises. In the…

    • 534 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Useful Expressions - Business Language  Apologizing I'm sorry. I made a mistake. Please accept my apologies. I'm sorry.…

    • 4364 Words
    • 18 Pages
    Satisfactory Essays
  • Good Essays

    How Can You Apologize Since A

    • 27844 Words
    • 69 Pages

    Since a long time, there was a nice youth lives with his beloved wife in harmony and humor. They always wished to have a child to bear their names and to achieve their hopes. One day, and after a long time of waiting, the wife got pregnant. Time started passing slowly, moment after moment, day after day, week after week, month after month, and finally, Sabreen, the wife of Ahmed, delivered Luai, the child that they had been waiting for a long time.…

    • 27844 Words
    • 69 Pages
    Good Essays
  • Powerful Essays

    diligence

    • 10909 Words
    • 60 Pages

    Look at the photograph on this page. What do think is happening? Create a story or scenario in your mind. Then write a sentence describing…

    • 10909 Words
    • 60 Pages
    Powerful Essays
  • Satisfactory Essays

    practice steps to be taking to prevent a breach on sensitive information to hacker or…

    • 290 Words
    • 2 Pages
    Satisfactory Essays