AuditXYZ

Data Breach: Definition, Response, and Compliance Requirements

Data Breach

A data breach occurs when confidential, sensitive, or protected information is accessed, disclosed, or exfiltrated without authorization. Data breaches can result from cyberattacks, insider threats, misconfigured systems, lost devices, or human error. The consequences include regulatory fines, legal liability, reputational damage, and loss of customer trust.

Types of Data Breaches

  • Unauthorized access — An attacker gains access to systems containing sensitive data through stolen credentials, exploited vulnerabilities, or social engineering
  • Accidental exposure — Data is unintentionally made public through misconfigured cloud storage, email errors, or improper disposal
  • Insider threat — An employee or contractor intentionally or negligently exposes data
  • Physical theft — Devices containing unencrypted sensitive data are stolen or lost

Notification Requirements

Compliance frameworks impose strict notification obligations:

GDPR requires notification to the supervisory authority within 72 hours of becoming aware of a breach involving personal data. If the breach poses a high risk to individuals, they must also be notified directly.

HIPAA requires covered entities to notify affected individuals within 60 days. Breaches affecting 500 or more individuals must also be reported to the HHS and media.

PCI DSS requires organizations to have an incident response plan that includes notification procedures for payment card brands and acquiring banks.

SOC 2 evaluates whether organizations have incident response procedures that include breach detection, response, and notification processes.

Prevention and Preparedness

Encrypt sensitive data at rest and in transit. Encryption renders stolen data unreadable and may reduce notification obligations under some regulations.

Implement strong access controls. Limit access to sensitive data to only those who need it. Monitor access patterns for anomalies.

Maintain an incident response plan. A documented, tested plan dramatically reduces breach response time and associated costs. Organizations with tested response plans save an average of $2.66 million per breach according to industry reports.

Classify your data. You cannot protect what you have not identified. Data classification ensures appropriate controls are applied based on sensitivity levels.

Related terms

Related frameworks

Get the framework starter pack

By submitting, you agree to our privacy policy.