{"id":444,"date":"2016-04-04T12:00:12","date_gmt":"2016-04-04T12:00:12","guid":{"rendered":"http:\/\/www.securityinshredding.com\/blog\/?p=444"},"modified":"2018-07-04T08:00:12","modified_gmt":"2018-07-04T08:00:12","slug":"when-to-disclose-a-data-breach","status":"publish","type":"post","link":"https:\/\/www.securityinshredding.com\/blog\/when-to-disclose-a-data-breach\/","title":{"rendered":"When To Disclose A Data Breach"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter wp-image-108 size-full\" src=\"https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2014\/09\/icloud-hacking.jpg\" alt=\"iCloud security wake-up call, data brach\" width=\"348\" height=\"145\" srcset=\"https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2014\/09\/icloud-hacking.jpg 348w, https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2014\/09\/icloud-hacking-300x124.jpg 300w\" sizes=\"(max-width: 348px) 100vw, 348px\" \/><\/p>\n<p><strong>Secure document destruction<\/strong> methods must be in place to comply with <strong>Data Protection<\/strong> laws. A\u00a0<a href=\"https:\/\/www.securityinshredding.com\/cork-shredding-services.php\"><strong>confidential document destruction<\/strong><\/a> service will benefit your business and its Data Protection.<\/p>\n<p>Technology has brought us accessibility to a global market and small businesses have benefited greatly from this boom in technology. With a greater number of devices connected to an online service has also meant that a increase in the number of cyber attacks. Small businesses in particular are now being targeted.<\/p>\n<p>A report from the Wall Street Journal has shown that small law firms are targeted the most due to the potential high profile client base they may have. That being said law firms do not usually hold social security information and the information obtained by hackers may not be beneficial to them.<\/p>\n<p>Under American law, law firms are required to inform the public that a breach has occurred.<\/p>\n<h1>Data Protection Commissioner<\/h1>\n<p>Under Irish law the Data Protection commissioner has Data Breach guidelines for you and your business to follow. If a breach occurs it is paramount that the matter is dealt with swiftly to minimise damage. Data Protection Commissioner data breach guidelines can be found at the link below.<\/p>\n<p><a href=\"https:\/\/www.dataprotection.ie\/docs\/Data-Breach-Handling\/901.htm\" rel=\"nofollow\">https:\/\/www.dataprotection.ie\/docs\/Data-Breach-Handling\/901.htm<\/a><\/p>\n<p>The document informs you on what steps to take if a breach has occurred. With this guide you can easily follow the steps needed to take and the information to provide when informing the Data Protection commissioner.<\/p>\n<p><strong><em>&#8220;Failure to comply with these obligations can result in a criminal prosecution with fines up to \u20ac5,000 indictment \u20ac250,000 per offence.&#8221;\u00a0<\/em><\/strong><\/p>\n<p>The document also state &#8220;<em>Prevention is better than cure.<\/em>&#8221; Setting up company policies and practices for handling of sensitive data should be implemented immediately. A reputable Shredding Service will also improve Data Security within your company. A shredding service will be able to provide an<strong>\u00a0onsite shredding<\/strong> service. Confidential shredding is paramount to shredding services.<\/p>\n<p>A reputable shredding service will comply with the protocols provided by the Data Protection Commissioner. It is a governing body to help protect your personal data and the data of others.<a href=\"https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2014\/09\/icloud-hacking.jpg\"><br \/>\n<\/a><\/p>\n<p>Please visit our site for more information on a Confidential Shredding Service:<\/p>\n<p><a href=\"https:\/\/www.securityinshredding.com\/\">https:\/\/www.securityinshredding.com\/<\/a><\/p>\n<p>Full Article Wall Street Journal Report:<\/p>\n<p><a href=\"https:\/\/blogs.wsj.com\/law\/2016\/03\/30\/when-do-law-firms-have-to-disclose-data-breaches\/\" rel=\"nofollow\">https:\/\/blogs.wsj.com\/law\/2016\/03\/30\/when-do-law-firms-have-to-disclose-data-breaches\/\u00a0 <\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Secure document destruction methods must be in place to comply with Data Protection laws. A\u00a0confidential document destruction service will benefit your business and its Data Protection. Technology has brought us accessibility to a global market and small businesses have benefited &hellip; <a href=\"https:\/\/www.securityinshredding.com\/blog\/when-to-disclose-a-data-breach\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[7,5,6,25,24],"tags":[58,28,35,51,38,39,27],"_links":{"self":[{"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/posts\/444"}],"collection":[{"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/comments?post=444"}],"version-history":[{"count":8,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/posts\/444\/revisions"}],"predecessor-version":[{"id":1329,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/posts\/444\/revisions\/1329"}],"wp:attachment":[{"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/media?parent=444"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/categories?post=444"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/tags?post=444"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}