Print PDF

Not "If" But "When" - Responding to Data Breach

MER Conference Program

Marriott Downtown Chicago – Magnificent Mile
540 North Michigan Avenue
Chicago, IL 60611

4:00 pm - 5:00 pm

Kari Rollins

Every day, we hear of another significant data breach, in which sensitive personal information, email and text messages, financial data, medical records, and all manner of other electronically stored information has been stolen, lost, or compromised. No industry has been untouched, and no organization is entirely safe. While prevention is the only “cure,” you and your organization must be prepared to address the near inevitability of a data breach. The Sedona Conference’s Working Group 11 on Data Security and Privacy Liability is developing comprehensive guidance for Information Governance professionals, ranging from a Primer on data privacy law to an Incident Response Guide. In this session, the editor of The Sedona Conference’s Incident Response Guide will walk us through the new publication and it resources, and explain the steps you need to take now to prepare yourself, before there has been a breach (at least, one that you know about).


  • What do the data privacy laws require of organizations and what kinds of data do they govern?
  • What steps do organizations need to take to prepare to address a near inevitable data breach?
  • What constitutes an acceptable response to the breach of sensitive data within an organization?


Attendees of this session will:

  • Become more familiar with the data privacy laws that govern various types of sensitive data.
  • Understand what are the components of an acceptable Data Breach response plan.
  • Receive specific guidance from The Sedona Conference’s Incident Response Guide to be used in creating specific response plans for their organizations.

A breach of sensitive data within your organization is almost inevitable (if it hasn’t already happened). While there are many things companies should be doing to protect the data they manage, it is equally important to prepare a comprehensive plan for how the organization will respond when a breach does occur. Serious financial, legal and reputational risk can arise from these situations and this session will highlight the best ways to prepare a response that can help mitigate these risks.

Click here for more information.


Practice Areas

Jump to Page

By scrolling this page, clicking a link or continuing to browse our website, you consent to our use of cookies as described in our Cookie and Advertising Policy. If you do not wish to accept cookies from our website, or would like to stop cookies being stored on your device in the future, you can find out more and adjust your preferences here.