Insight

Ten Common Myths of Data Breach Mitigation and Response

In 2014, Alicia Gilleskie debunked 10 common myths associated with data breaches.

AG

Alicia Gilleskie

August 2, 2015 12:00 AM

2014 has been dubbed by many as “The Year of the Data Breach.” While data breaches are not new, the recent slew of highly publicized retailer breaches has left companies wondering – If breaches can’t be prevented, why should we do anything different? The following list is based on audience comments and participation during our 2014 “breach mitigation and response” presentation series. In our experience, a bit of debunking goes a long way to help companies prioritize efforts to address data and IT-related risks.

Myth 1 – We don’t have sensitive data

If you have employees, business contacts, consumer website users or customers, then you have sensitive data that is regulated under a patchwork of laws and regulations.

Myth 2 – Data breach mitigation and response is an IT project

Yes, the IT staff implements technical and operational aspects of a company’s technology systems. But breach prevention and response is an ongoing process that is best addressed by multiple stakeholders. Management, lawyers and forensics experts also play a critical role in breach mitigation and response.

Myth 3 – IT and data risk management are not issues for management or the board

IT systems and data involve financial and reputational risks that affect the entire organization. Management sets the tone for the types of attention being given to these issues. And the Securities and Exchange Commission (SEC) recently warned that “boards who choose to ignore, or minimize, the importance of cybersecurity oversight responsibility, do so at their own peril.” Go to this Safeguarding Business Alert for more information.

Myth 4 – Outsourcing is a way to avoid responsibility for the data

Outsourcing may physically remove the data from the organization, but it does not remove the legal obligations of the organization that outsources. Whether moving data operations to the cloud or a hosting center, or using third party systems to collect or process information, outsourcing functions involving data assets raise new considerations in vendor selection and contracting.

Myth 5 – Our CGL policy covers us for data breaches

Commercial general liability (CGL) insurance policies provide businesses with a wide array of coverage, but companies can expect that claims based on data breach incidents uniformly will be denied under the new standard forms for CGL policies issued by ISO—the Insurance Services Office, Inc. Go to this Client Alert for more information.

Myth 6 – Our privacy and security officers have these issues covered for us

An internal structure that includes privacy and security officers is the foundation for any data privacy and security program. But they, alone, can’t “make” the company compliant, or “prevent” the company from having a breach.

Myth 7 – Our technology makes us compliant

The market is full of technologies that facilitate data privacy and security, but no one technology is or can make an organization compliant. A holistic strategy is needed to address data risk concerns from technical, legal and operational perspectives.

Myth 8 – Our employees already know what to do

User error is a major cause of data mishaps. Rapidly evolving information technologies and an assortment of hackers finding creative ways to attack have left many users in the dark about current best practices.

Myth 9 – Our IT policies are enough to address data breach mitigation and response

Organizations that do not have, or have not revisited, their privacy and security policies in the past year should do so now. The law continues to evolve at warp speed. New obligations are likely to have arisen, and employees need a guidebook on how to spot problems and who to call.

Myth 10 – Deleting the data and audit trails will keep us from having to notify anyone in the event of a data breach

Without sufficient technical information ruling out the possibility of a breach, companies often are placed in a position of over-notification. In addition, preserving this information may be a legal responsibility.

For more information, follow the source link below.

Trending Articles

2026 Best Lawyers Awards: Recognizing Legal Talent Across the United States


by Jamilla Tabbara

The 2026 editions highlight the top 5% of U.S. attorneys, showcase emerging practice areas and reveal trends shaping the nation’s legal profession.

Map of the United States represented in The Best Lawyers in America 2026 awards

Gun Rights for Convicted Felons? The DOJ Says It's Time.


by Bryan Driscoll

It's more than an administrative reopening of a long-dormant issue; it's a test of how the law reconciles the right to bear arms with protecting the public.

Firearms application behind jail bars

2026 Best Lawyers Awards in Canada: Marking 20 Years of Excellence


by Jamilla Tabbara

Honoring Canada’s most respected lawyers and spotlighting the next generation shaping the future of law.

Shining Canadian map marking the 2026 Best Lawyers awards coverage

Revealing the 2026 Best Lawyers Awards in Germany, France, Switzerland and Austria


by Jamilla Tabbara

These honors underscore the reach of the Best Lawyers network and its focus on top legal talent.

map of Germany, France, Switzerland and Austria

Best Lawyers 2026: Discover the Honorees in Brazil, Mexico, Portugal, South Africa and Spain


by Jamilla Tabbara

A growing international network of recognized legal professionals.

Map highlighting the 2026 Best Lawyers honorees across Brazil, Mexico, Portugal, South Africa and Sp

How to Sue for Defamation: Costs, Process and What to Expect


by Bryan Driscoll

Learn the legal standards, costs and steps involved when you sue for defamation, including the difference between libel and slander.

Group of people holding papers with speech bubbles above them

Build Your Legal Practice with Effective Online Networking


by Jamilla Tabbara

How thoughtful online networking supports sustained legal practice growth.

Abstract web of connected figures symbolizing online networking among legal professionals

Algorithmic Exclusion


by Bryan Driscoll

The Workday lawsuit and the future of AI in hiring.

Workday Lawsuit and the Future of AI in Hiring headline

Blogging for Law Firms: Turning Content into Client Connections


by Jamilla Tabbara

How law firms use blogs to earn trust and win clients.

Lawyer typing blog content on laptop in office

Reddit’s Lawsuit Could Change How Much AI Knows About You


by Justin Smulison

Big AI is battling for its future—your data’s at stake.

Reddit Anthropic Lawsuit headline

How to Choose a Good Lawyer: Tips, Traits and Questions to Ask


by Laurie Villanueva

A Practical Guide for Your First-Time Hiring a Lawyer

Three professional lawyers walking together and discussing work

The 2026 Best Lawyers Awards in Chile, Colombia and Puerto Rico


by Jamilla Tabbara

The region’s most highly regarded lawyers.

Map highlighting Chile, Colombia and Puerto Rico for the 2026 Best Lawyers Awards

Common-Law Marriage in Indiana: Are You Legally Protected?


by Laurie Villanueva

Understanding cohabitation rights and common-law marriage recognition in Indiana.

Married Indiana couple in their home

Why Jack Dorsey and Elon Musk Want to 'Delete All IP Law'


by Bryan Driscoll

This Isn’t Just a Debate Over How to Pay Creators. It’s a Direct Challenge to Legal Infrastructure.

Elon Musk and Jack Dorsey standing together Infront of the X logo

AI Tools for Lawyers: How Smithy AI Solves Key Challenges


by Jamilla Tabbara

Understand the features and benefits within the Best Lawyers Digital Marketing Platform.

Legal professional editing profile content with Smithy AI

Alimony Explained: Who Qualifies, How It Works and What to Expect


by Bryan Driscoll

A practical guide to understanding alimony, from eligibility to enforcement, for anyone navigating divorce

two figures standing on stacks of coins