Why You Need to Treat a Breach as a Customer—Not a Compliance—Issue

A breach happens. In my experience dealing with breach resolution, this means companies run to call forensic investigators, legal counsel, law enforcement and others. Then the breach notices arrive. Without the proper channels in place for a smooth and quick resolution, unfortunately I’ve seen consumers rush to call the media, litigators and the competition.

When all runs smoothly, you know you’re handling the technical and regulatory sides of breach response with aplomb. However, as I’ve seen time and time again, what you might be falling behind on is the consumer engagement side of breach response, and that’s when your customers start making calls.

Companies need to reevaluate their breach response or face the fallout—to the tune of more than $3 million. That’s the average amount a data breach costs a U.S. company in lost business as a result of reputation damage, abnormal customer turnover and related expenses.It’s no small sum, because your brand’s reputation is no small thing.

It’s not always easy to own up to what happened in such an open, honest way. So here’s the challenge for all companies moving forward: Start treating privacy and breach response as a customer issue—not just a compliance issue.  It’s time to update core practices to be prepared for and mitigate the damage of an incident beyond just checking the compliance box.

Incidents are making front page news from local papers to national headlines.  In fact, with the recent Data Breach Report from the California Attorney General, it’s likely that we will continue to see more and more conversation. Just imagine waking up to the morning newspaper with a front-page headline reading (aka screaming) something along the lines of, “Would You Trust Your (Business/Life/Health, etc.) to (Your Company)?” You get the idea—just fill in the blanks. Inside the story are plenty of customer complaints, and stakeholder scrutiny isn’t far behind.

As the customers drop off, the damage in lost business costs add up. And it can all take years to overcome.

There is a touchy feely side of managing fallout from a data breach. Put yourself in their shoes. Are they going to be happy with what you have to say in your breach notice? Are they going to feel cared for and protected? Are they going to have any reason to jump on the breach litigation bandwagon?

In other words, don’t treat your breach population like they are just another technical component of the incident to handle. Treat them like people.

How can companies take steps beyond a compliance-only response? It comes down to three key areas—start on the right foot with your customers, enable the proper tools to ensure they can protect themselves and keep an open line of communication.

  • Detailed breach notice. This is your chance to set things right with the breach population. While there are certain industries that now have strong regulations about disclosure, remember to keep the end customer in mind, not just the potential fines. Have a plan in place to be able to readily communicate—what happened, what you’re doing to fix it and how you’re taking steps to ensure it won’t happen again. Essentially, answer the question that’s now in the consumer’s mind, “Do I still want to continue my relationship with this company or take my business elsewhere?”
  • Well-rounded identity protection. Consider providing everyone in your breach population a meaningful means of protection, such as identity protection with credit monitoring and ongoing fraud resolution. Be sure to tailor the identity protection to the type of data that was lost. That way, members of your breach population can feel confident in their security and in continuing to do business with you.
  • Reassuring customer experience. Consumer-centric breach response doesn’t have to end with the breach notice and identity protection. Let your breach population know you’re there, really there, for them. Hire a call center that’s available seven days a week so your own internal staff isn’t overwhelmed with calls. Set up a website to answer frequently asked questions about the breach. In essence, don’t hide from your breach population. Embrace them.

While you are liable to do certain things following a breach, you can also step up and go the extra mile for members of the breach population, helping to ensure the longevity of your relationship with them through good times and bad.

Written By

Michael Bruemmer, CIPP/US


If you want to comment on this post, you need to login.


Board of Directors

See the esteemed group of leaders shaping the future of the IAPP.

Contact Us

Need someone to talk to? We’re here for you.

IAPP Staff

Looking for someone specific? Visit the staff directory.

Learn more about the IAPP»

Daily Dashboard

The day’s top stories from around the world

Privacy Perspectives

Where the real conversations in privacy happen

The Privacy Advisor

Original reporting and feature articles on the latest privacy developments

Privacy Tracker

Alerts and legal analysis of legislative trends

Privacy Tech

Exploring the technology of privacy

Canada Dashboard Digest

A roundup of the top Canadian privacy news

Europe Data Protection Digest

A roundup of the top European data protection news

Asia-Pacific Dashboard Digest

A roundup of the top privacy news from the Asia-Pacific region

Latin America Dashboard Digest

A roundup of the top privacy news from Latin America

IAPP Westin Research Center

Original works. Groundbreaking research. Emerging scholars.

Get more News »

IAPP Communities

Meet locally with privacy pros, dive deep into specialized topics or connect over common interests. Find your Community in KnowledgeNet Chapters, Sections and Affinity Groups.

IAPP Job Board

Looking for a new challenge, or need to hire your next privacy pro? The IAPP Job Board is the answer.

Join the Privacy List

Have ideas? Need advice? Subscribe to the Privacy List. It’s crowdsourcing, with an exceptional crowd.

Find a KnowledgeNet Chapter Near You

Talk privacy and network with local members at IAPP KnowledgeNet Chapter meetings, taking place worldwide.

Find more ways to Connect »

Find a Privacy Training Class

Two-day privacy training classes are held around the world. See the complete schedule now.

The Privacy Core™ Library Has Evolved

Privacy Core™ e-learning essentials just expanded to include seven new units for marketers. Keep your data safe and your staff in the know!

Online Privacy Training

Build your knowledge. The privacy know-how you need is just a click away.

Upcoming Web Conferences

See our list of upcoming web conferences. Just log on, listen in and learn!

Train Your Team

Get your team up to speed on privacy by bringing IAPP training to your organization.

Let’s Get You DPO Ready

There’s no better time to train than right now! We have all the resources you need to meet the challenges of the GDPR.

Learn more »

CIPP Certification

The global standard for the go-to person for privacy laws, regulations and frameworks

CIPM Certification

The first and only privacy certification for professionals who manage day-to-day operations

CIPT Certification

The industry benchmark for IT professionals worldwide to validate their knowledge of privacy requirements

FIP Designation

Recognizing the advanced knowledge and issue-spotting skills a privacy pro must attain in today’s complex world of data privacy.

Certify Your Staff

Find out how you can bring the world’s only globally recognized privacy certification to a group in your organization.


The IAPP’S CIPP/E and CIPM are the ANSI/ISO-accredited, industry-recognized combination for DPO readiness. Learn more today.

Learn more about IAPP certification »

Are You Ready for the GDPR?

Check out the IAPP's EU Data Protection Reform page for all the tools and resources you need.

IAPP-OneTrust PIA Platform

New U.S. Government Agency privacy impact assessments - free to IAPP members!

IAPP Communities

Meet locally with privacy pros, dive deep into specialized topics or connect over common interests. Find your Community in KnowledgeNet Chapters, Sections and Affinity Groups.

Privacy Vendor List

Find a privacy vendor to meet your needs with our filterable list of global service providers.

More Resources »

Europe Data Protection Intensive 2017

The Intensive is sold out! But cancellations do happen—so hurry and get on the wait list in case more seats become available.

Global Privacy Summit 2017

The world’s premier privacy conference returns with the sharpest minds, unparalleled programs and preeminent networking opportunities.

Canada Privacy Symposium 2017

The Symposium returns to Toronto this spring and registration has opened! Take advantage of Early Bird rates and join your fellow privacy pros for another stellar program.

The Privacy Bar Section Forum 2017

The Privacy Bar Section Forum is sold out! But you can still add your name to the wait list, and we'll keep in touch about your status. Good luck!

Asia Privacy Forum 2017

Call for Speakers open! Join the Forum in Singapore for exclusive networking and intensive education on data protection trends and challenges in the Asia Pacific region.

Privacy. Security. Risk. 2017

We're bringing the best of the best in privacy and infosecurity to sunny San Diego. Early registration for P.S.R. opens May 1.

Europe Data Protection Congress 2017

Call for Speakers open! The Congress is your source for European policy debate, multi-level strategic thinking and thought-provoking discussion. Submit a proposal by March 19.

Sponsor an Event

Increase visibility for your organization—check out sponsorship opportunities today.

More Conferences »

Become a Member

Start taking advantage of the many IAPP member benefits today

Corporate Members

See our list of high-profile corporate members—and find out why you should become one, too

Renew Your Membership

Don’t miss out for a minute—continue accessing your benefits

Join the IAPP»