Data Breach Risk Management
Share |

Data Breach Risk Management

In Wisconsin, Personal Information Includes:
An individual's first name or first initial with last name with one of the following identifiers:
  • Social Security number
  • Driver's license or identification card number
  • Account number, credit or debit card number, in combination with a linked security or access code, or password of an individual's financial account
  • DNA profile
  • The individual's unique biometric data, including fingerprint, voice print, retina or iris image, or any other unique physical representation.
If one of the data elements linked to an individual's name is encrypted, redacted or altered in a manner that renders the element unreadable, no notice is required. The law applies to electronic and paper records.
The notice shall be provided within a reasonable time, not to exceed 45 days after the entity learns of the acquisition of personal information. Failure to comply with this section is not negligence or a breach of any duty, but may be evidence of negligence or breach of a legal duty.


As a Beazley Breach Response policyholder, you have unlimited access to:
Online Compliance Materials
Federal and state compliance materials regarding data security, data breaches, and data privacy, including:
  • Quick Tips on many subjects; Summaries of federal/state laws
  •  Links to statutes & regulations; Sample policies & procedures
  • Continuing updates and electronic notification of significant changes to the online materials
Step-By-Step Procedures to Lower Risk
Procedures and online forms help you:
  • Understand the scope of personal information
  • Determine where Personally Identifiable (PI) is stored
  • Collect and/or retain the minimum amount of PI as required for business needs
  • Properly destroy PI that is no longer needed
  • Implement an Incident Response Plan
Quarterly Newsletter & Instant Alerts
  • Sent by email, learn about changes in federal and state laws regarding data security, data breach, and data privacy issues; Instant Alerts sent for events that require immediate attention
Handling Data Breaches
Guidance provided to:
  • Help prevent data security incidents
  • Respond to a data breach
Training Modules
  • Online training programs; Employee training bulletins
  • Webinars for privacy compliance and IT staff
  • Audio and PodCast training for managers and/or employees
Expert Online Support
  • Expert support from consultants/attorneys on data security issues
  • Assistance with Health care & HIPAA compliance issues
  • Data breach prevention
  • Data security best practices
  • Computer forensic issues
Handling Data Breaches
  • Help prevent data security incidents
  • Respond to a data breach
  • Data breach prevention