Your Company Has Been Hacked; Should You Call the Government?

U.S. companies' vulnerability to data security incidents through computer hacking has garnered unprecedented public awareness in the last 12 months. Given our increasing volume of user data generated in business and its significant value, hacking will remain a common feature in the data landscape. In one respect, the most sophisticated hack is no different than the first stagecoach robbery: A crime has occurred.

Both the Computer Fraud and Abuse Act and Stored Communications Act contain criminal penalties for certain violations (see 18 U.S.C. 1030 & 2701, respectively) and, depending on the particular data taken from the victim, other federal statutes may be implicated as well. Therefore, in the rush to respond to the hack, the victim needs to assess whether the involvement of law enforcement is appropriate.

Justin Daniels, Baker Donelson, Atlanta.
Justin Daniels, Baker Donelson, Atlanta.

In our experience, we often see hacking victims hesitant to involve law enforcement. They fear law enforcement snooping around the company will soon lead to a knock on the door of a government regulator. This concern can start to outweigh the very real need to collect evidence, potentially find the perpetrator or determine if the attack is connected to other attacks or threat indicators that law enforcement is monitoring. What does a careful thought process look like to determine when and whether to involve the government?

As a first step, assess what data was accessed or exfiltrated. Hopefully, your organization is prepared with an Incident Response Plan (IRP) that can be put into place quickly, identifying key roles and leaders in the response. Your IRP should help you identify what information assets your company has and where they were stored, and thus whether the security of critical data was compromised. A best practice is to simulate an attack to see how the IRP works in a real situation. You don't want to find out your IRP has problems when you are responding to a real hack.

Knowing the sensitivity of the data at risk should help you formulate next steps: If you can be assured that the only data that was compromised involves information that does not bear on personal privacy, business data or trade secrets, keeping the process in-house may be defensible. If, however, critical, business-sensitive information has been compromised or extracted (or if your systems are in a state such that you cannot make that determination), reaching out to the authorities for help becomes a better option.

You should also assess whether the security incident raises business concerns, regulatory concerns or both. Does the incident have the potential to violate privacy guarantees that your organization has made to customers? Will you need to provide notice to affected individuals? If so, keeping everything in-house may later carry the whiff of a cover-up if the incident becomes public, but having brought law enforcement into the mix shows that your organization is treating the event as the criminal invasion that it was.