The Sedona Conference Releases Incident Response Guide for Public Comment
The guide, available for public comment until June, aims to serve as a reference tool for those unfamiliar with incident response plans or state breach notification laws.
March 29, 2018 at 12:04 PM
4 minute read
Less than a year after releasing the third edition of its flagship e-discovery guide, the Sedona Conference is again adding to its library—but this time, with data security top of mind. The nonprofit research and educational institute has announced the release of “The Sedona Conference Incident Response Guide,” available for public comment through June 19 on its website.
The guide, authored by The Sedona Conference Working Group 11 on Data Security and Privacy Liability, is intended to serve as a reference tool for those who have never created an incident response plan and struggle to understand state breach notification requirements.
“The Sedona Conference believes that because of the complexity and the differences of all the state breach notification laws, it would be helpful to bring some sort of structure to the notification process,” said Robert Cattanach, a partner at Dorsey & Whitney and editor-in-chief of the new guide.
He added that the publication will also offer an incident plan template for readers to get “some sense of what it would have to look like.”
The guide, whose authors said was “drafted with small to medium-sized organizations in mind,” contains advice on how one should go about creating an incident response plan and the steps that need to happen before, during and after the incident. For instance, it discusses how and when companies need to contact external parties—such as law enforcement, insurance carriers and vendors—to limit their liability and effectively address any related risks.
What's more, the guide explains how companies can tailor their incident response plans to the different types of situations they may face. In the midst of a cyberattack from external actors, for instance, it's important to preserve any evidence of intrusion, though that's not always an easy thing to do.
“For example, in many traditional networks, disconnecting power from a server will not be an appropriate means of preserving evidence,” the guide notes. “In some situations, it may be appropriate for the server or other hardware to remain powered on, but the network connection severed.”
The last section of the guide looks at the obligations parties have to notify state agencies under different scenarios. For example, “When you might discover that there was some intruder, but they didn't take anything, that may not create or trigger an obligation,” Cattanach said.
While the guide does not go into each state breach notification law in detail, it does group state laws together depending on their requirements—for example, states that require parties to notify the attorney general's office of a breach, or those that require notification only if an incident produces a “reasonable likelihood of harm.”
Cattanach noted that state breach notification laws posed a particular challenge for the authors of the guide because of the pace at which they are evolving. Since the guide was published for public comment, he said, South Dakota has passed its own breach notification law, while Alabama is also considering passing such a law as well.
“The final comment is due June 19, and then we'll take those comments and respond to them as appropriate,” Cattanach said, adding that the guide will be updated to reflect the new states' laws, though such updates will likely take several months.
When asked how the guide will keep up-to-date on all the changes to state breach laws that may arise in the future, Cattanach noted that The Sedona Conference is still debating the best course of action.
“We are still struggling with that question,” he said. “What I anticipate is that we will have some sort of addendum, roughly on an annual basis, so we can add something to what is there, but we won't change the master document. But the final answer to that is by no means certain.”
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2025 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllTrending Stories
Who Got The Work
J. Brugh Lower of Gibbons has entered an appearance for industrial equipment supplier Devco Corporation in a pending trademark infringement lawsuit. The suit, accusing the defendant of selling knock-off Graco products, was filed Dec. 18 in New Jersey District Court by Rivkin Radler on behalf of Graco Inc. and Graco Minnesota. The case, assigned to U.S. District Judge Zahid N. Quraishi, is 3:24-cv-11294, Graco Inc. et al v. Devco Corporation.
Who Got The Work
Rebecca Maller-Stein and Kent A. Yalowitz of Arnold & Porter Kaye Scholer have entered their appearances for Hanaco Venture Capital and its executives, Lior Prosor and David Frankel, in a pending securities lawsuit. The action, filed on Dec. 24 in New York Southern District Court by Zell, Aron & Co. on behalf of Goldeneye Advisors, accuses the defendants of negligently and fraudulently managing the plaintiff's $1 million investment. The case, assigned to U.S. District Judge Vernon S. Broderick, is 1:24-cv-09918, Goldeneye Advisors, LLC v. Hanaco Venture Capital, Ltd. et al.
Who Got The Work
Attorneys from A&O Shearman has stepped in as defense counsel for Toronto-Dominion Bank and other defendants in a pending securities class action. The suit, filed Dec. 11 in New York Southern District Court by Bleichmar Fonti & Auld, accuses the defendants of concealing the bank's 'pervasive' deficiencies in regards to its compliance with the Bank Secrecy Act and the quality of its anti-money laundering controls. The case, assigned to U.S. District Judge Arun Subramanian, is 1:24-cv-09445, Gonzalez v. The Toronto-Dominion Bank et al.
Who Got The Work
Crown Castle International, a Pennsylvania company providing shared communications infrastructure, has turned to Luke D. Wolf of Gordon Rees Scully Mansukhani to fend off a pending breach-of-contract lawsuit. The court action, filed Nov. 25 in Michigan Eastern District Court by Hooper Hathaway PC on behalf of The Town Residences LLC, accuses Crown Castle of failing to transfer approximately $30,000 in utility payments from T-Mobile in breach of a roof-top lease and assignment agreement. The case, assigned to U.S. District Judge Susan K. Declercq, is 2:24-cv-13131, The Town Residences LLC v. T-Mobile US, Inc. et al.
Who Got The Work
Wilfred P. Coronato and Daniel M. Schwartz of McCarter & English have stepped in as defense counsel to Electrolux Home Products Inc. in a pending product liability lawsuit. The court action, filed Nov. 26 in New York Eastern District Court by Poulos Lopiccolo PC and Nagel Rice LLP on behalf of David Stern, alleges that the defendant's refrigerators’ drawers and shelving repeatedly break and fall apart within months after purchase. The case, assigned to U.S. District Judge Joan M. Azrack, is 2:24-cv-08204, Stern v. Electrolux Home Products, Inc.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250