Preview

Unit 6 Analysis Of The Breach Notification Law Letter

Satisfactory Essays
Open Document
Open Document
254 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 6 Analysis Of The Breach Notification Law Letter
Robert Jones
Unit 6 Assignment Analysis of the Breach Notification Law Letter
2/9/2015
IS3350
Mr. Pragel

Breach notification law letters have contributed to the importance of information security throughout every business level of an organization. Every department of a corporation has the responsibility to detect, monitor, investigate and report breaches; whether a data or physical breach. Reports of breaches help not only IT security officers maintain awareness, but also every other member of an organization as well. Breaches cause reputational damage to organizations, and each one can have major consequences to the corporation. Breach notification letters lead to awareness and attention that may have gone unnoticed or unknown by other companies. These letters must follow the following guidelines when being written:
Take responsibility and apologize.
Be clear and unassuming. Most people today understand identity theft, but data breach is still a foreign word. Explain what happened, be transparent and honest. Write at a simple understandable level that everyone can understand.
Explain the customer options without scaring them. Provide them a phone number and resources if they are concerned and want assistance.
Remember that the customer is a single person and should feel that the company is making a genuine attempt to protect them.
Be leery of red flags. Letters should be sent to someone outside the company and ask how it reads to them. Does it scare them or do they feel some type of comfort?
Explain how the company is ensuring that this type of incident doesn’t happen again.
Apologize again.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    A breach notification letter is a good thing, as it means the company is doing something. If one of these letters happens to find its way to you, it means your PII was stolen. If it happens to be a company that has a records department, they would have to identify whose and what records were compromised. Also the CFO has to approve the letter of breach that will be sent to customers, and also the legal team has to proof it and okay it. With a data breach in the state of Wisconsin, the letter must include the type of data that might have been stolen and…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    You should always treat your client as an individual, with individual needs. And their privacy should be respected at all times.…

    • 809 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    In addition, organizations constantly face legal, ethical, and regulatory requirements from governments, business partners, and others they work with. These will add additional factors when weighing the costs and benefits of different solutions to information security risks. In fact, these requirements may even make some risks more important, often because a company will not want to get in trouble with a government even though they might normally live with the risk they are being forced to resolve through regulations. Understanding the various laws that will affect data is of prime importance to any security…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    Discovery helps to analyze and understand how breaches occur. If this company can reduce system vulnerabilities can reduce the risk and impact of threats, to the system significantly.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Our business relies on getting our customer to know and trust us during the initial stage of our relationship such that they will continue working with us for the long term. To accomplish this we must treat our clients with respect and provide a high level of service that is unattainable from another company. Our clients are placing a high level of trust in us and we must honor that commitment by ensuring no confidential information is disseminated outside our company or to those inside the company who may have a conflict of interest. Above all else we will be professional with our clients and work to the best of our ability to provide them with unrivaled service.…

    • 1256 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Information that is stored in an organisation has to follow the security and confidentiality procedures. For example finances, customer’s and employee’s details should be secured and only certain members of staff should be able to access physical and electronic data unless you have been given authorisation. If information gets into the wrong hands it could have serious consequences and might lead to legal action.…

    • 777 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The information stored by an organisation must be kept safe and secure at all times. This is to make sure that the organisation satisfies all of the legal requirements relating to the information which it keeps. The organisation has a duty of care to safeguard the information in its possession. This is to protect the security of its customers as well as its staff.…

    • 501 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Foresic Science

    • 1473 Words
    • 6 Pages

    What happened ? Tell the story of your case. Present the important details of this case: who, what, where, when, why (motive), attempts to cover up the crime, the investigation, etc.…

    • 1473 Words
    • 6 Pages
    Better Essays
  • Good Essays

    My strategy was to ask directly for the customer service manager to discuss the situation. I would…

    • 980 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Data breaches that could lead to identity theft, by sector - the danger of data breaches are of particular importance for organizations that store and manage large amounts of personal information. Not only can compromises that result in the loss of personal data undermine customer and institutional confidence, result in costly damage to an organization’s reputation, and result in identity theft that may be costly for individuals to recover from, they can also be financially debilitating to organizations.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Every company likes to advertise its customer service, but few live up to their promises. In the…

    • 534 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Useful Expressions - Business Language  Apologizing I'm sorry. I made a mistake. Please accept my apologies. I'm sorry.…

    • 4364 Words
    • 18 Pages
    Satisfactory Essays
  • Powerful Essays

    diligence

    • 10909 Words
    • 60 Pages

    Look at the photograph on this page. What do think is happening? Create a story or scenario in your mind. Then write a sentence describing…

    • 10909 Words
    • 60 Pages
    Powerful Essays
  • Satisfactory Essays

    practice steps to be taking to prevent a breach on sensitive information to hacker or…

    • 290 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    How Can You Apologize Since A

    • 27844 Words
    • 69 Pages

    Since a long time, there was a nice youth lives with his beloved wife in harmony and humor. They always wished to have a child to bear their names and to achieve their hopes. One day, and after a long time of waiting, the wife got pregnant. Time started passing slowly, moment after moment, day after day, week after week, month after month, and finally, Sabreen, the wife of Ahmed, delivered Luai, the child that they had been waiting for a long time.…

    • 27844 Words
    • 69 Pages
    Good Essays