258 days
Average time to identify and contain a data breach (IBM Cost of a Data Breach 2024)
$164 per record
Average cost per record breached across all industries
Over 50%
Percentage of breaches caused by stolen or compromised credentials
All 50 states plus DC, Puerto Rico, and Guam
US states with data breach notification laws

A data breach triggers obligations on multiple simultaneous tracks: technical (contain and remediate), legal (notify regulators and affected individuals within defined windows), evidentiary (preserve forensic artifacts for investigation and litigation), and reputational (communicate with customers, employees, and media). The notification track is the one with the hardest deadlines and the highest penalty exposure. GDPR requires notification to supervisory authorities within 72 hours of becoming aware of a breach. The SEC's cybersecurity disclosure rule requires public companies to file an 8-K for material cybersecurity incidents within 4 business days of determining materiality. HIPAA allows 60 days but imposes specific content and delivery requirements. State breach notification laws add another layer with varying definitions, timelines, and affected party requirements across all 50 states.

The practical challenge is that most organizations discover a breach without initially knowing its scope, the data affected, or whether it triggers specific regulatory thresholds. Response must proceed on the assumption that notification will be required while the investigation is still underway. This guide covers the decision logic for each major regulatory regime, the evidence preservation requirements that protect the organization's legal position, the internal coordination required to meet notification deadlines, and the operational content requirements for notification letters and regulatory filings.

Breach vs. Security Incident: The Legal Distinction That Triggers Notification

Not every security incident is a notifiable breach. Understanding the legal definition of a breach under each applicable regulatory regime is the first decision in any incident response scenario involving potential data exposure.

GDPR definition (Article 4(12)): A personal data breach is a security incident leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to personal data transmitted, stored, or otherwise processed. This is a broad definition: it includes not just theft but also accidental deletion, unauthorized access by an internal employee, and loss of an unencrypted laptop. The notification obligation applies even if the data has not been exfiltrated; unauthorized access alone may be sufficient.

HIPAA definition: A breach under HIPAA is the acquisition, access, use, or disclosure of protected health information (PHI) in a manner not permitted by the HIPAA Privacy Rule that compromises the security or privacy of the PHI. HIPAA provides a four-part risk assessment framework to determine whether a presumption of breach applies: the nature of the PHI involved, who accessed or could have accessed it, whether PHI was actually acquired or viewed, and the extent to which risk has been mitigated.

The HIPAA risk assessment for breach determination: The HIPAA Omnibus Rule creates a presumption of breach for any impermissible access to PHI unless the covered entity or business associate can demonstrate a low probability that PHI was compromised through a risk assessment of four factors:

  1. The nature and extent of the PHI involved (what types, how sensitive, is data de-identifiable)
  2. The unauthorized person who accessed or could have accessed the PHI (is this a workforce member, a threat actor, or an uncertain party?)
  3. Whether the PHI was actually acquired or viewed (as opposed to the access opportunity existing without evidence of access)
  4. The extent to which the risk has been mitigated (were the data returned unused, was the unauthorized person prosecuted?)

SEC materiality determination: The SEC's 2023 cybersecurity disclosure rules require public companies to determine whether a cybersecurity incident is material. Materiality follows the standard securities law definition: information is material if there is a substantial likelihood that a reasonable investor would consider it important in making an investment decision. Factors: financial impact of the incident, operational disruption scope, customer data exposure volume, regulatory exposure, and reputational harm. There is no bright-line dollar threshold for materiality; it requires judgment with legal counsel involvement.

State breach law definitions: State laws define breach differently. Most require unauthorized acquisition of personal information. Some (California, New York) include unauthorized access even without acquisition evidence. The triggering data categories vary: most states require notification for Social Security numbers, financial account numbers, and driver's license numbers; newer laws add medical information, biometrics, and login credentials. When an incident potentially involves residents of multiple states, the most expansive applicable state law typically governs the response timeline.

Notification Timelines by Regulatory Regime

Notification deadlines begin running from different trigger points under different regulatory regimes. Understanding when the clock starts is as important as knowing how long you have.

GDPR: 72 hours from awareness Clock starts: when the organization becomes aware of the breach. GDPR recognizes that organizations may not have full information within 72 hours and allows phased notification: an initial notification within 72 hours with the information available, followed by supplemental notifications as more information becomes available.

Required notification content (Article 33):

  • Nature of the breach (categories and approximate number of data subjects and records)
  • Name and contact details of the Data Protection Officer (or other contact point)
  • Likely consequences of the breach
  • Measures taken or proposed to address the breach and mitigate its effects

Notification is made to the lead supervisory authority (the data protection authority of the EU member state where the organization is established). For UK GDPR, notify the ICO. If the organization determines the breach is unlikely to result in a risk to individuals' rights and freedoms, documentation is still required but supervisory authority notification is not mandatory.

Notification to data subjects (Article 34): If the breach is likely to result in high risk to individuals, notification to the affected individuals is also required, without undue delay. This is a separate obligation from the supervisory authority notification and applies when there is high risk of harm to individuals (identity theft, financial loss, discrimination).

HIPAA: 60 days from discovery Clock starts: when the breach is discovered (when the covered entity knew or should have known of the breach, not when it is confirmed). Business Associates have 60 days from discovery to notify the Covered Entity; the Covered Entity then has 60 days from its own discovery.

Notification requirements:

  • Affected individuals: written notification (first-class mail or email with prior authorization) within 60 days
  • HHS Secretary: notification via the HHS breach portal. Breaches affecting 500 or more individuals in a state require notification within 60 days; breaches affecting fewer than 500 individuals may be submitted in an annual log
  • Prominent media outlets: for breaches affecting 500 or more residents of a state, notification to major media outlets is required

SEC: 4 business days from materiality determination Public companies must file Form 8-K Item 1.05 within 4 business days of determining that a cybersecurity incident is material. The clock does not start at discovery; it starts at the materiality determination. This creates a two-phase obligation: discover the incident, investigate to determine materiality, then file within 4 days of that determination. The SEC has stated it expects companies to make materiality determinations without unreasonable delay.

The 8-K must describe: the nature, scope, and timing of the incident; the material impact or reasonably likely material impact on the company.

State breach notification laws: All 50 states have breach notification laws. The most expansive are California (CCPA/CPRA adds private right of action for certain breaches), New York (SHIELD Act), and Colorado (CPA). Key variables by state: definition of personal information, notification timeline (ranging from expedient/reasonable time to specific windows like 30 or 45 days), content requirements for notification letters, and whether notification to the state Attorney General is required in addition to affected individuals.

For multi-state breaches: notify under the most stringent applicable state law to ensure compliance. Maintain a state breach law reference document listing each state's timeline, covered data types, and AG notification requirement.

Free daily briefing

Briefings like this, every morning before 9am.

Threat intel, active CVEs, and campaign alerts, distilled for practitioners. 50,000+ subscribers. No noise.

Evidence Preservation: Protecting Your Legal Position

How an organization handles evidence in the first hours after discovering a breach significantly affects its legal exposure, its ability to investigate the full scope, and its insurance coverage. Evidence destruction or alteration, even unintentional, can constitute spoliation with serious legal consequences.

Legal hold procedures: Upon discovering a suspected breach, legal counsel should issue a litigation hold notice immediately, directing all personnel to preserve all potentially relevant information: logs, emails, configuration files, system images, and communications related to the incident. Routine deletion processes that would destroy relevant evidence must be suspended.

What to preserve:

  • System logs: security logs, application logs, authentication logs, network flow data covering the suspected compromise window plus 30 days before and after
  • Memory images: if compromised systems are still running, capture full memory images before rebooting or isolating (memory contains active process data, network connections, and potentially attacker tools that are lost on reboot)
  • Disk images: forensic bit-for-bit copies of affected system drives, created before any remediation activity
  • Network captures: PCAP data from network monitoring tools covering the compromise period
  • Email and communications: preserve all email, chat, and ticket communications related to the incident and any related vendor communications
  • Configuration snapshots: capture current configurations of affected systems before changes are made

Chain of custody: Document who collected each piece of evidence, when, using what tools, from what source. Chain of custody documentation is required for evidence to be admissible in legal proceedings and accepted by law enforcement. Use write-blockers when creating disk images to prevent evidence alteration. Hash all collected evidence files immediately after collection (SHA-256) and document the hash values.

Interplay with containment decisions: Evidence preservation and containment sometimes conflict: the fastest containment action (wiping and rebuilding the affected system) destroys the evidence needed for investigation. The right sequencing: capture memory and disk images first, document all observable indicators (running processes, network connections, files), then proceed with containment and remediation. For active ransomware encryption events, immediate isolation takes priority over evidence collection given the risk of spread.

Forensic investigation scope: Determine whether to use an internal forensic team or an external IR firm. External IR firms bring specialized expertise, established chain of custody procedures, and tools calibrated for legal proceedings. They are also independent, which matters if the breach results from internal failures that create legal exposure for leadership. Most cyber insurance policies provide an IR firm retainer as a covered expense; engage the insurer's approved IR vendor list before retaining independently to avoid coverage disputes.

Regulatory Notification Process and Filings

Each regulatory regime has a specific notification process, portal, or filing mechanism. Understanding the mechanics before an incident reduces execution friction during the notification window.

GDPR supervisory authority notification: Identify your lead supervisory authority based on your EU establishment (for EU-based organizations) or the location where decisions about data processing are made (for non-EU organizations with EU operations). File notification through the supervisory authority's online portal or by email to their designated contact address. Most EU data protection authorities (DPAs) have an online breach notification portal:

  • UK: ICO Report a Breach portal at ico.org.uk
  • Germany: notifications go to the relevant state DPA (Datenschutzbehörde)
  • France: CNIL at cnil.fr
  • Ireland: Data Protection Commission at dataprotection.ie (lead DPA for many US tech companies with EU HQ in Ireland)

HIPAA HHS breach portal: File HIPAA breach notifications at hhs.gov/hipaa/for-professionals/breach-notification/breach-reporting. For breaches affecting 500 or more individuals: file within 60 days of discovery. For smaller breaches: maintain an internal log and submit the annual report by March 1 of the following year. Retain confirmation receipts from the portal submission.

SEC 8-K filing: For public companies, the 8-K is filed through EDGAR at sec.gov. Work with external securities counsel on the first material cybersecurity 8-K. The filing requires legal review to ensure the description of the incident does not overstate or understate the material impact in ways that create subsequent liability. The SEC has taken enforcement action against both late filers and filers who delayed materiality determinations unreasonably.

State AG notifications: Approximately 30 states require notification to the state Attorney General in addition to affected individuals. Maintain a reference document of state AG notification requirements. The NCSL breach notification law tracker at ncsl.org provides a current state-by-state reference. For large breaches affecting residents in many states, an experienced privacy law firm should manage the multi-state notification process.

Law enforcement notification: CISA requests notification of significant cybersecurity incidents via cisa.gov/report. FBI notification via ic3.gov is recommended for any ransomware attack, BEC incident, or nation-state suspected compromise. Law enforcement notification is generally voluntary for private sector organizations (mandatory reporting obligations under CIRCIA will expand when implementing regulations are finalized) but is encouraged. Law enforcement can sometimes assist with evidence collection, decryption key recovery in ransomware cases, and financial fraud recovery.

Breach Notification Letter Requirements and Templates

Breach notification letters to affected individuals have specific legal content requirements that vary by jurisdiction. A letter that omits required elements can result in regulatory findings of inadequate notification.

HIPAA notification letter requirements: HIPAA notification letters must include (45 CFR 164.404):

  • Brief description of what happened, including the date of the breach and date of discovery
  • Description of the types of PHI involved (not the specific data)
  • Steps individuals should take to protect themselves from potential harm
  • Brief description of what the covered entity is doing to investigate, mitigate harm, and prevent future breaches
  • Contact information for individuals to ask questions (toll-free telephone number, email address, website, or mailing address)

GDPR individual notification requirements (Article 34): When individual notification is required, the communication must describe:

  • Nature of the breach in plain language
  • Contact details of the DPO or other relevant contact
  • Likely consequences of the breach
  • Measures taken or proposed to address the breach Notification must be direct to the individual; media substitution is only permitted when direct communication would involve disproportionate effort.

State law content requirements: State laws add requirements beyond HIPAA and GDPR. California (Civil Code 1798.82) requires specific language for Social Security number breaches and credit monitoring offer information. New York SHIELD Act requires specific categories to be identified. Some states require the letter to include the toll-free number for major credit bureaus.

Notification letter best practices:

  • Write at a 6th to 8th grade reading level. Affected individuals who receive technical jargon-heavy letters are less likely to take protective action.
  • Lead with the most important information: what data was exposed and what individuals should do right now.
  • Offer concrete protective actions: free credit monitoring enrollment link, instructions for placing a fraud alert or credit freeze, dedicated response hotline number.
  • Set a realistic response hotline capacity before mailing. Large breach notifications generate significant call volume; an understaffed hotline compounds reputational damage.
  • Avoid admitting fault or liability in the letter body. All language should be reviewed by legal counsel before the mailing list is processed.
  • Document the mailing date, method, and list of notified individuals for regulatory record-keeping requirements.

Credit monitoring and identity protection offers: For breaches involving Social Security numbers, financial account numbers, or other high-risk data, offering 12 to 24 months of free credit monitoring to affected individuals is standard practice. This reduces both the probability of harm to individuals and the probability of class action litigation. Vendors: Experian, Equifax, TransUnion, IDX, Kroll, and AllClear ID provide breach response credit monitoring services with bulk pricing.

Cyber Insurance and the Breach Response Workflow

Cyber insurance interacts with breach response in ways that create operational requirements that must be understood before an incident occurs.

Notify the insurer immediately: Most cyber insurance policies require notification to the insurer as early as practicable after discovery of a potential claim, often within 24 to 72 hours. Failure to notify promptly can result in coverage denial. Designate the person responsible for insurer notification as part of the IR plan so this step does not get overlooked during the chaos of initial response.

Use insurer-approved vendors: Most cyber insurance policies cover IR forensics, legal fees, breach notification costs, and credit monitoring under a panel of pre-approved vendors. Retaining vendors outside the approved panel may result in reduced coverage or denial of those costs. Obtain the approved vendor list from your insurer before an incident and include it in your IR runbook.

What cyber insurance typically covers:

  • Forensic investigation costs (IR firm fees)
  • Legal counsel fees related to breach notification and regulatory response
  • Notification letter printing and mailing costs
  • Credit monitoring and identity protection service costs
  • Public relations support
  • Business interruption losses (revenue loss from system downtime)
  • Ransomware payments (in some policies, subject to conditions)
  • Regulatory fines and penalties (coverage varies; GDPR fines may be uninsurable in some jurisdictions)

What it typically does not cover:

  • Fines and penalties in jurisdictions where insurance of regulatory fines is prohibited by law
  • Betterment costs (security improvements beyond restoring pre-breach capability)
  • Losses from intentional acts by insured parties
  • Systemic risks where many policyholders are affected simultaneously (pandemic-scale cyber events)

Ransomware payment considerations: Cyber insurance policies that cover ransomware payments typically require insurer approval before payment, OFAC sanctions screening of the receiving wallet (paying to a sanctioned entity violates US law regardless of insurance coverage), and cooperation with law enforcement. FBI guidance discourages ransomware payment but does not prohibit it. Document the business justification for any payment decision including why alternatives to payment were not viable.

The bottom line

Breach response is a time-critical, multi-track operation where notification deadline failures create regulatory exposure independent of the underlying breach. Build your response capability before an incident: identify your lead GDPR supervisory authority and bookmark their breach reporting portal, load the HHS HIPAA breach portal in your IR runbook, designate the person responsible for insurance notification and provide them the insurer's hotline number, and retain external legal counsel specializing in privacy law before you need them. The 72-hour GDPR window and 4-business-day SEC window move faster than most organizations expect during active incident response.

Frequently asked questions

What is the GDPR breach notification deadline?

GDPR requires notification to the relevant supervisory authority within 72 hours of becoming aware of a personal data breach, where the breach is likely to result in a risk to individuals' rights and freedoms. If the full details are not available within 72 hours, an initial notification with available information must be submitted, followed by supplemental notifications. The clock starts when the organization becomes aware, not when the breach began or when investigation is complete.

What triggers the SEC 4-day cybersecurity disclosure requirement?

The SEC's cybersecurity disclosure rule (effective December 2023) requires public companies to file an 8-K under Item 1.05 within 4 business days of determining that a cybersecurity incident is material to investors. The clock starts at the materiality determination, not at discovery. The SEC has stated that companies should make materiality determinations without unreasonable delay once they have sufficient information. The 8-K must describe the nature, scope, timing, and material impact or likely material impact of the incident.

Does every data breach require notifying individuals?

No. Individual notification thresholds vary by regulatory regime. Under GDPR, individual notification is required only when the breach is likely to result in high risk to individuals' rights and freedoms. Under HIPAA, all breaches of unsecured PHI require individual notification unless a four-factor risk assessment demonstrates low probability of compromise. State breach notification laws generally require individual notification when specific categories of personal information (SSNs, financial account numbers) are involved. Encrypted data breaches typically do not require notification if the encryption key was not compromised.

What is the difference between a HIPAA breach and a HIPAA security incident?

A HIPAA security incident is any actual or suspected unsuccessful or successful unauthorized access, use, disclosure, modification, or destruction of PHI or information systems. A HIPAA breach is a subset: an impermissible acquisition, access, use, or disclosure of PHI that compromises the security or privacy of the PHI and is not excluded by one of the three narrow exceptions. All breaches are security incidents, but not all security incidents are breaches. The notification obligations (60 days, HHS reporting, media notification) apply only to breaches, not to all security incidents.

How do you handle breach notification when you do not know the full scope yet?

GDPR explicitly accommodates phased notification: submit an initial notification to the supervisory authority within 72 hours with the information available, clearly indicating that the assessment is ongoing and supplementary information will follow. Include what is known: the approximate number of individuals potentially affected, the categories of data involved, and the containment measures already taken. Follow up with supplementary notifications as investigation progresses. Most supervisory authorities prefer early partial notifications over late complete notifications.

What should a breach notification letter say?

An effective breach notification letter includes: a clear opening statement describing what happened and when, the types of data involved (without unnecessary technical detail), specific actions individuals should take to protect themselves (free credit monitoring enrollment link, fraud alert instructions), what the organization is doing to prevent recurrence, and contact information for a dedicated response hotline and the organization's privacy team. Write at a 6th to 8th grade reading level. Have legal counsel review all language before mailing to avoid statements that could be used as liability admissions.

Does cyber insurance cover GDPR fines?

Coverage for GDPR fines varies by jurisdiction and policy. In some EU member states, insuring administrative fines and penalties is prohibited as contrary to public policy, making those fines uninsurable regardless of policy terms. In other jurisdictions, coverage may be available. US cyber insurance policies generally include regulatory fine coverage with sub-limits. Review your specific policy language and confirm coverage with your broker before relying on insurance to cover potential GDPR exposure. Many policies cover breach notification costs, legal fees, and investigation costs even where fines are excluded.

Sources & references

  1. GDPR Article 33-34: Breach Notification Requirements
  2. HHS: HIPAA Breach Notification Rule Guidance
  3. SEC: Cybersecurity Risk Management and Incident Disclosure Rules (August 2023)
  4. CISA: Cyber Incident Reporting Guide
  5. NCSL: Security Breach Notification Laws by State

Free resources

25
Free download

Critical CVE Reference Card 2025–2026

25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.

No spam. Unsubscribe anytime.

Free download

Ransomware Incident Response Playbook

Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.

No spam. Unsubscribe anytime.

Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.

Free Brief

The Mythos Brief is free.

AI that finds 27-year-old zero-days. What it means for your security program.

Joins Decryption Digest. Unsubscribe anytime.

Daily Briefing

Get briefings like this every morning

Actionable threat intelligence for working practitioners. Free. No spam. Trusted by 50,000+ SOC analysts, CISOs, and security engineers.

Unsubscribe anytime.

Mythos Brief

Anthropic's AI finds zero-days your scanners miss.