Oct 30, 201812:36 PMLegal Login
with Mindi Giftos
As manufacturing moves into cyberspace, so do security threats
(page 2 of 2)
It is important to understand your current cyber liability policies (and other policies) that may apply in the event of a breach. We recommend identifying relevant policies before an incident occurs so that applicable coverage can be quickly assessed when needed.
3. Vendor/third-party agreements
It is important to compile a list of vendors and other service providers who could be involved in a potential data breach, along with a summary of key contract provisions. If an incident comes through a vendor or service provider, manufacturers need to quickly determine the nature of the vulnerability.
All employees should be trained (and retrained) about the importance of privacy and security. Many breach incidents occur due to human error.
5. Access regulatory requirements
While sometimes the threat profile for manufacturers relates primarily to their own proprietary data, often customer and employee data can trigger significant regulatory and legal requirements for companies in the wake of a breach incident. Manufacturers need to access their obligations proactively and to know ahead of time what their specific obligations are with respect to reporting incidents to the government or to key customers.
Attending to these five areas of concern won’t inoculate manufacturers against a data breach, but they can help reduce the severity of an attack, as well as empower enterprises to find their footing after the fact.
Click here to sign up for the free IB ezine — your twice-weekly resource for local business news, analysis, voices, and the names you need to know. If you are not already a subscriber to In Business magazine, be sure to sign up for our monthly print edition here.