Ten Steps to Follow in the Event of a Security Breach — John Isaza, Esq.

“Although this issue may seem outside the scope for records managers, our new breed of Information Governance professionals may be called to participate in the response process. I say this because data breaches involve hacking into Records of the organization, which we have a duty to Protect under the Generally Accepted Record keeping Principles.” … Ten