3 Questions GCs Should Be Ready To Answer After A

Portfolio Media. Inc. | 860 Broadway, 6th Floor | New York, NY 10003 | www.law360.com
Phone: +1 646 783 7100 | Fax: +1 646 783 7161 | [email protected]
3 Questions GCs Should Be Ready To Answer After A Breach
By Melissa Maleske
Law360, New Orleans (April 29, 2015, 5:56 PM ET) -- It's an increasingly common scenario for general
counsel: A phone call in the middle of the night brings news that someone unauthorized has accessed
company data. The decisions that come next raise a host of delicate considerations that need to be
carefully assessed and balanced, according to compliance experts and an FBI cyberintrusion investigator
who spoke at a conference Tuesday.
How do we balance mitigation and preservation?
When general counsel get the call, they first need to try to stem the bleeding by working with
information technology and security managers to regain control of their data, perhaps by disconnecting
machines from the network, said panelists who ran a cyberattack response simulation Tuesday at
the Association of Corporate Counsel's 2015 Advanced Compliance Education Seminar.
At the same time, general counsel need to launch what will likely become an extensive informationgathering process and preserve all evidence related to the breach. But sometimes seemingly innocuous
measures aimed at containing an attack can destroy metadata that is valuable for investigative
purposes.
“Isolate and control, but then don't manipulate it after that,” said Cyndi Baily, chief compliance officer at
Alere Toxicology. “[We want] to save the data but stop the data breach. Given the choice, I'm going to
go with stopping the damage and hopefully having enough to preserve to get the bad guys later.”
Whatever steps are taken to mitigate the breach should be carefully documented, said Corey Harris, a
cyberintrusion investigator with the Federal Bureau of Investigation. It's critical that general counsel are
later able to tell law enforcement what the company did, Harris said. The FBI will ask about what server
was affected, whether it was taken offline, and whether the breach response team accessed any files on
it before it went offline.
“If you start playing around with files, you're erasing critical evidence,” Harris said. “[For example], every
time you access a file, the time stamp changes, so you need to be very careful about what you access,
and when you do, make sure you document everything you access. You can record the time stamps
before you access a particular file. It gives us an idea of when this occurred and how long they may have
been accessing these files.”
When should we begin notifying key parties?
A general counsel trying to assess the impact of a breach needs to determine when or if to begin
informing the company's CEO, law enforcement and their cybersecurity insurance carrier about the
breach.
Looping in the CEO should come before reaching outside the organization, but general counsel may not
necessarily want to call top executives immediately. First, they should collect all the facts they can in the
earliest stages of their investigation and formulate a suggested plan of action.
“It's a delicate balance,” Baily said, “but you have to have enough to have some substantive discussion,
or at least to be able to say, 'This is what we know now, and here's what we do.' Because your job in
many of these situations is to keep calm and to keep working.”
General counsel also may want to develop a clearer view of the breach before contacting law
enforcement. They'll want to determine how sensitive the data is and how severe the incident is before
going to authorities such as the FBI. The FBI doesn't need to know every time a company's antivirus
software flags a potential virus, said Mark Thibodeaux, a privacy and data security deputy practice
leader at Sutherland Asbill & Brennan LLP.
And general counsel need to make the call about when to notify their cyber insurance carriers. A
standard policy will offer a window of a few days after discovering a breach to notify them — and those
days are good wiggle room. It's often a question of control. Some general counsel want to take charge;
others may wish to use their carrier's counsel and vendors, which may be free under their policy.
“I'm reluctant to get them involved too early, as they have the rights in the policy to take over, and you
lose some control,” Baily said. “Hopefully you'll benefit from the coverage, but again you have to find
the sweet spot. Bring them in too early, and you may be Chicken Little.”
Some general counsel may decide to delay notifying outside parties to avoid a leak to the press about a
data breach before they even know many of the details.
Nevertheless, Harris encouraged companies to contact law enforcement early in the investigation, even
if just to give them a heads-up that an issue could be coming down the pike, but the company needs to
do its due diligence before providing more information.
"I've had companies do that, and I have no problem with it," Harris said. "As for exposure, the last thing I
want is for the media to find out that I'm conducting a particular investigation. If I divulge that
information to the media, I'm subject to losing my job. So it's a myth that as soon as the FBI finds out,
they want to let everyone know there was an incident."
How do we preserve privilege during the investigation?
Notifying and looping in various parties also raises questions of privilege. If general counsel want to keep
their investigation cloaked under the attorney-client privilege, they need to make an early call to bring in
outside counsel and minimize the circle of individuals privy to incident details.
“My recommendation is that at least in the early days when you don't know anything, you want to have
the privilege,” Thibodeaux said.
If more information becomes available, general counsel may determine it's not necessary to bring in
pricey outside counsel to investigate.
“Obviously if we think the risk is really high ... you may decide to have external counsel conduct the
investigation so it's all privileged,” said Sarah Sederstrom, contracts counsel at KPM Group. “If it looks
like it's going to be a little less bet-the-company, we may decide we're fine with doing it internally.”
Keeping IT staff, engineers and other data security experts on the case could expose companies to
discovery down the road, Thibodeaux said. They will likely document in emails and reports their early
findings and first impressions — and even if they are proved to be wrong after a factual investigation,
they're now on the record.
“Once it's in writing, it's not cloaked under the privilege, and it's potentially discoverable,” Thibodeaux
said. “It will at least be something you have to explain in a deposition later on.”
As investigations progress, in-house counsel should be present in any conversation or questioning they
hope to keep privileged, he said. Even if it's information the company later decides to divulge, it's best to
preserve the option to invoke privilege.
In other jurisdictions, extra steps may be necessary to preserve privilege. In much of the European
Union, for example, bringing in outside counsel will be an easier decision since most EU nations do not
consider in-house counsel attorneys for privilege purposes.
--Editing by Kat Laskowski and Mark Lebetkin.
All Content © 2003-2015, Portfolio Media, Inc.