Privacy Incident
Response.
Data breach, ransomware, phishing, human error, or an Authority inquiry — every privacy incident requires coordinated response within hours. DPO support during the first 24-72 hours, Authority notification drafting, data-subject communications, and a formal post-mortem.
The first 72 hours
Initial triage
What happened? When? What data is involved? How many subjects? Is the action ongoing? Is there immediate risk? Setting priority and freezing state.
Notification obligation assessment
Is Authority notification required under Amendment 13? Notification to data subjects? Under GDPR? Sector-specific regulation? Document decisions.
Information gathering & initial post-mortem
Work with IT / CISO / forensics — what was the breach scope, which databases, which subjects, which systems. Organized documentation.
Authority notification & message drafting
Formal notification to the Israeli Privacy Authority. Drafting messages for data subjects, management, customers, and media if required. Cross-department coordination.
Response and deepening
Handle subject inquiries, Authority queries, media. Expand investigation, find more affected records, deploy mitigations.
Formal post-mortem
Internal post-mortem report, fix list, required investments. Presentation to management and audit committee. Update policies.
Eight incident types we handle
Data breach
Unauthorized access, exposed database, spreadsheet sent to wrong address. Most common type.
Ransomware
Forced encryption, ransom demand. Judgment call: pay or not, did the data also exfiltrate (Double extortion).
Phishing success
Employee clicked a link, gave credentials, external actors get in. Scope assessment, access blocking, password reset.
Human error
Email to wrong distribution list, unencrypted document batch, accidental site publication. Usually less severe — but still requires assessment.
Internal unauthorized access
Employee accessed a database they shouldn’t have. Question: intent? Misuse? How was it discovered?
Vendor breach
Your vendor was hit, and your data leaked. Still your duty to notify the Authority and data subjects — not theirs.
Authority inquiry
Authority opened an investigation, audit, or information request. Also an "incident" requiring professional coordination and precise drafting.
Lawsuit / legal threat
Data subject threatens lawsuit, contacts a lawyer, files a complaint with the Authority. Requires legal-privacy-PR coordination.
What goes in the Authority notification
| Field | Detail |
|---|---|
| Incident description | When, where, how discovered, who is involved |
| Scope | How many subjects, what data types, whether special-category data |
| Processing purposes | Why data was originally collected, on what legal basis |
| Security measures in place | What was active, and why it didn’t prevent the incident |
| Mitigations taken | What you did to stop the incident and prevent further harm |
| Future plan | What change will prevent the next occurrence (controls, policies, training) |
| Communications to subjects | Whether, when, and how you notified affected subjects |
| DPO contact / official point of contact | Whom the Authority can reach for clarifications |
Frequent questions about incident response
When is Authority notification mandatory?
What is the timeline?
What if investigation is still ongoing?
Must we notify data subjects?
Do you offer 24/7 availability?
We are not your client — can we get urgent help?
How much does it cost?
What to do right now if I have an incident?
Have an active incident?
Don’t wait until morning. Contact us now — I respond within 2 hours, including nights and holidays.
Urgent contact