Senior Corporate Counsel Cybersecurity & Data Protection TransUnion, United States
Reports generated by internal and external cybersecurity incident response teams are universally requested during the discovery phase of post-incident litigation. They serve as a roadmap for plaintiffs to understand the technical vulnerabilities that allowed the incident to occur. Accordingly, organizations are incentivized to assert and maintain the privilege of the reports to prevent production and limit legal liability. Even though they have compelling interests to share the report internally to harden systems after an incident, the courts have not interpreted privilege to allow both the protection from production and internal use for technical hardening. This session will discuss attorney-client privilege vs. work product privilege and confidentiality, as well as application during a data breach and litigation.
Learning Objectives:
Define the fundamentals of attorney-client privilege and work product - specifically, what the doctrines protect and how they are applied in practice during litigation.
Recall how organizations in breach litigation have attempted to apply privilege and what courts have relied on to accept or reject privilege claims.
Apply best practices when creating potentially discoverable information during an incident response.