In Case You Missed It!

By Susan Duarte

Your monthly source for curated updates on Marketing, Privacy, AI, and other relevant industry news.

September 29, 2025

ICYMI: Issue #2: September 2025

ICYMI: The Inaugural Issue

August 25, 2025

Prefer to listen instead? We’ve made an audio version of this newsletter so you can catch the highlights on the

Why I Created ICYMI: My Perspective on Making Legal Intelligence Accessible

July 23, 2025

After more than 20 years working in-house, I know the frustration all too well. You’re juggling back-to-back meetings, managing competing

Meet Susan Duarte

Susan is a trusted legal advisor for businesses ranging from startups to Fortune 100 companies, specializing in technology, advertising, data privacy, and consumer protection. She leads a skilled team in navigating complex regulatory landscapes and risk management while providing practical, proactive guidance. Recognized as the “Best In-House Counsel of the Year” by the Association of Corporate Counsel in 2024, Susan has successfully represented clients before various regulatory bodies and is known for her expertise in litigation and compliance.

Why I Created ICYMI

After more than 20 years working in-house, I know the frustration all too well. You’re juggling back-to-back meetings, managing competing deadlines, and trying to stay on top of the legal developments that could impact your business. Then another law firm alert lands in your inbox. You want to read it—you know you should read it—but there’s simply no time.

Sound familiar?

This is exactly why I created ICYMI (In Case You Missed It), and why building a dedicated space for product counsel (and really all counsel) matters so much to me.

Data Breach Guide for Legal Counsel

A comprehensive visual reference for prevention and response

Data Breach Prevention Strategy

Data Breach Prevention Flow

Data Mapping

Create a comprehensive data inventory

Legal Assessment

Document applicable laws and regulations

Data Classification

Categorize data by sensitivity and legal impact

Security Implementation

Establish administrative, electronic, and physical safeguards

Vendor Management

Assess third-party relationships and contracts

Data Mapping

Legal Assessment

Data Classification

Security Implementation

Privacy Policy Alignment

Vendor Management

Critical Legal Consideration

Consider purchasing dedicated cyber insurance coverage to transfer risk and provide additional response resources during an incident.

Data Breach Response Strategy

Data Breach Response Workflow

Detection & Reporting

Identify and report suspected breach

Team Activation

Engage response team and establish command

Containment

Secure systems and stop data exfiltration

Investigation

Determine scope, affected data, and root cause

Legal Analysis

Assess legal obligations and notification requirements

Notification & Response

Notify affected parties and manage communications

Detection & Reporting

Team Activation

Containment

Investigation

Legal Analysis

Notification & Communications

External Resources List

Legal Counsel Priority Actions

Immediately assess notification obligations across all jurisdictions, establish attorney-client privilege for investigation, and coordinate all external communications to maintain consistency and limit liability exposure.

Data Breach Response Team Structure

Core Response Team Members & Responsibilities

Incident Lead / CISO

Coordinates overall response and serves as final decision-maker during the incident

Legal Counsel

Assesses legal obligations, maintains privilege, and advises on regulatory requirements

IT Security

Leads technical investigation, containment, and remediation efforts

Data Privacy Officer

Advises on privacy implications and compliance requirements

Risk Management

Coordinates with insurers and assesses organizational impact

Communications / PR

Develops and coordinates internal and external communications

Human Resources

Manages employee communications and workforce implications

Customer Service

Prepares to handle customer inquiries and concerns

Legal Counsel Specific Responsibilities

Cross-Functional Coordination

Team Preparation Critical

Regular tabletop exercises and simulations are essential to test the response team’s readiness. Conduct these exercises at least annually and after significant organizational changes.

Data Breach Response Timeline

Initial Detection (0-24 Hours)

  • Document discovery of potential breach
  • Activate response team and establish command
  • Begin containment procedures
  • Preserve evidence and secure systems
  • Notify cyber insurance provider
  • Engage forensic experts if needed

Assessment Phase (24-72 Hours)

  • Complete preliminary investigation
  • Identify compromised data and affected individuals
  • Determine applicable legal requirements
  • Evaluate contractual notification obligations
  • Prepare initial legal assessment
  • Develop preliminary communication plan

Notification Planning (72-96 Hours)

  • Draft notification letters for affected individuals
  • Prepare regulatory notifications
  • Establish call center services if needed
  • Arrange credit monitoring services
  • Finalize external communications strategy
  • Brief executives and board members

External Communications (Per Legal Requirements)

  • Issue notifications within required timeframes
  • Submit regulatory filings
  • Activate call center for inquiries
  • Monitor media coverage and social media
  • Respond to stakeholder inquiries
  • Document all communications activities

Ongoing Response (Week 2+)

  • Continue remediation efforts
  • Complete thorough forensic investigation
  • Address secondary notification requirements
  • Manage ongoing communications
  • Track expenses for insurance claims
  • Begin developing lessons learned

Post-Incident Review (30-60 Days)

  • Conduct formal post-incident analysis
  • Document effectiveness of response plan
  • Identify areas for improvement
  • Update data protection measures
  • Revise response plan based on lessons learned
  • Conduct follow-up training

Time-Sensitive Legal Requirements

Be aware that some jurisdictions require notification within specific timeframes (as short as 72 hours in some cases). Legal counsel must identify all applicable deadlines immediately upon breach confirmation.

IT Governance & Security Framework

IT Security Governance Domains

Physical Security

Secure physical access and environment

System Security

Secure technical infrastructure

Threat Mitigation

Address specific threat vectors

Access Control

Manage human access to systems

Legal Compliance

Ensure regulatory adherence

Physical Security Governance

System Security Governance

Access Control Governance

Social Engineering Defense

Malware & DoS Defense

Legal Compliance Framework

Contractual Security Governance

Legal Counsel's Governance Role

As legal counsel, you must actively engage with IT staff in developing the security policies and procedures outlined above. Document all training efforts and policy implementations to demonstrate due diligence in case of regulatory investigations or litigation following a breach incident.

Protecting Attorney-Client Privilege

Privilege Protection Framework

Pre-Breach Planning

Structure processes to protect privilege

Two-Track Investigation

Separate legal and technical investigations

Communication Protocols

Control how information is shared

Documentation Control

Manage report creation and distribution

Training & Education

Ensure stakeholders understand privilege

Pre-Breach Privilege Planning

Two-Track Investigation Strategy

Communication Protocols

Forensic Report Management

Distribution Control

Training & Education

Critical Privilege Considerations

Courts have increasingly scrutinized privilege claims in data breach litigation. Preparation alone does not guarantee privilege protection. Legal counsel should actively manage the investigation process, ensure all communications have a legal purpose, and maintain clear documentation of counsel’s involvement in directing the investigation.

Common Privilege Pitfalls to Avoid

This guide is designed as a visual aid for legal professionals and does not constitute legal advice.

Subscribe

Subscribe to ICYMI—your monthly source for curated updates on Marketing, Privacy, AI, and other relevant industry news that actually matters.

DISCLAIMER: By subscribing to our firm’s newsletter, you acknowledge that you have read and understand the disclaimers posted to our site.