About the Course
Guided by **Liisa** Thomas, a law firm partner and experienced data security and privacy practitioner, this program is designed for in-house lawyers and privacy professionals who want to understand not just what the law says about breaches, but how to operate as trusted advisors in the heat of a real incident. It combines short lessons with practical tools, templates, and exercises you can apply to help your organization coordinate its breach response in real-world scenarios. If you answer yes to any of these, this course is for you: - You want to do more than memorize breach statutes—you want to apply the law to realistic, messy facts and client demands. - You need to quickly assess which breach notice or security laws apply, and when notifications are truly triggered. - You want to develop the counselor skills that matter: listening, distilling complex rules into clear guidance, and managing client communications. - You seek hands-on understanding of how to evaluate and draft breach notices, make difficult judgment calls, and defend your recommendations. - You want to be ready for what comes next—post-breach inquiries, lawsuits, and the wider fallout for your clients. Rather than walking through high-level reviews or static checklists, this course puts you in the action. In Module 1, you will orient to the logic of breach notice and data security laws—mapping how to identify which laws apply, understanding what kinds of events count as breaches, and organizing risk factors. You’ll build tools for deciphering law applicability, coverage, and insurance as you move. In Module 2, you will break down the varied definitions of personal and sensitive information in different industries and jurisdictions, organizing them into a toolkit that works in real incidents. Module 3 immerses you in defining when an incident rises to the level of a breach, navigating core tests around access, acquisition, and harm. You’ll evaluate exceptions, work through assignments to organize gray areas, and practice explaining nuanced legal outcomes to “clients.” Module 4 covers the investigation process: how to manage internal reviews, engage with outside vendors, and preserve privilege, then organize and relay findings as trusted counsel. Module 5 focuses on notifications—what to say, when, how, and to whom. You’ll practice providing notice, debating whether to notify when it’s not mandatory, and responding to client and authority demands. Module 6 tackles the post-notification world: managing regulatory inquiries, lawsuits, public relations challenges, and the creation of safe harbors and clear post-breach stories. By the end of the course, you will have a practical, roadmap to breach response: you’ll know how to identify and evaluate breach law coverage, make defensible calls under pressure, communicate clearly with clients, and withstand the real-world scrutiny that follows every incident. You’ll build the toolkit, experience, and judgment that help organizations not merely survive a breach, but respond as leaders.
Course Curriculum
-
1
Module 1: Introduction to Data Security and Incident Response
-
(Included in full purchase)
1:1 Course Introduction
-
(Included in full purchase)
1:2 Understanding Breach Notice Laws
-
(Included in full purchase)
1:3 What Breach Notice Laws Cannot Do
-
(Included in full purchase)
1:4 Organizing Breach Notice Laws Quiz
-
(Included in full purchase)
1:5 Data Security Laws
-
(Included in full purchase)
1:6 Determining Applicability
-
(Included in full purchase)
1:7 Breach Notice Law Applicability Quiz
-
(Included in full purchase)
1:8 Industry Specific Laws
-
(Included in full purchase)
1:9 Toolkit Instructions: Introduction to Organizing Laws - Charting
-
(Included in full purchase)
1:10 Toolkit Submission: Creating a Chart
-
(Included in full purchase)
1:11 Managing Breach Insurance Coverage
-
(Included in full purchase)
1:12 Insurance Quiz
- 1:13 Module Conclusion Free preview
-
(Included in full purchase)
1:14 Module Resources
-
(Included in full purchase)
-
2
Module 2: Defining Personal Information
-
(Included in full purchase)
2:1 Module Introduction
-
(Included in full purchase)
2:2 Industry-Specific Definitions of Personal Information
-
(Included in full purchase)
2:3 Industry-Specific Definitions of Personal Information Quiz
-
(Included in full purchase)
2:4 Sensitive Information
-
(Included in full purchase)
2:5 Sensitive Information Quiz
-
(Included in full purchase)
2:6 Usernames and Passwords Case Study
-
(Included in full purchase)
2:7 Toolkit Instructions Organizing Types of Personal Information
-
(Included in full purchase)
2:8 Toolkit Submission: Organizing Types of Personal Information
-
(Included in full purchase)
2:9 Module Conclusion
-
(Included in full purchase)
2:10 Module Resources
-
(Included in full purchase)
-
3
Module 3: When Is an Incident a "Breach"
-
(Included in full purchase)
3:1 Module Introduction
-
(Included in full purchase)
3:2 The Importance of Access and Acquisition
-
(Included in full purchase)
3:3 Toolkit Instructions: Defining "Breach" Under US State Laws
-
(Included in full purchase)
3:4 Toolkit Submission: Organizing Access and Acquisition
-
(Included in full purchase)
3:5 Breach for Regulated Industry
-
(Included in full purchase)
3:6 Likelihood of Harm Exception to Notification
-
(Included in full purchase)
3:7 Likelihood of Harm Quiz
-
(Included in full purchase)
3:8 Exceptions if Follow Other Laws
-
(Included in full purchase)
3:9 Exceptions to Following Other Laws Quiz
-
(Included in full purchase)
3:10 Internal Policy, Physical Information, Encryption and Good Faith Exceptions
-
(Included in full purchase)
3:11 Toolkit Instructions: Exceptions Chart
-
(Included in full purchase)
3:12 Toolkit Submission: Exceptions Chart
-
(Included in full purchase)
3:13 Module Conclusion
-
(Included in full purchase)
3:14 Module Final Quiz
-
(Included in full purchase)
3:15 Module Resources
-
(Included in full purchase)
-
4
Module 4: Conducting Investigations
-
(Included in full purchase)
4:1 Module Introduction
-
(Included in full purchase)
4:2 Introduction to Investigations
-
(Included in full purchase)
4:3 Using Third Parties As Part of an Investigation
-
(Included in full purchase)
4:4 Maintaining Privilege
-
(Included in full purchase)
4:5 Investigation Mechanics
-
(Included in full purchase)
4:6 Investigation Mechanics Quiz
-
(Included in full purchase)
4:7 Cooperating with Law Enforcement
-
(Included in full purchase)
4:9 Toolkit Submission: Cooperating with Law Enforcement Chart
-
(Included in full purchase)
4:10 If Breach Is Of the Vendors' Systems
-
(Included in full purchase)
4:12 Module Conclusion
-
(Included in full purchase)
-
5
Module 5: Notification
-
(Included in full purchase)
5:1 Module Introduction
-
(Included in full purchase)
5:2 Basics of Notification
-
(Included in full purchase)
5:3 Using Third-Party Notice Providers
-
(Included in full purchase)
5:4 Basics of Notification Quiz
-
(Included in full purchase)
5:5 Should You Notify Anyway?
-
(Included in full purchase)
5:6 Notifying Anyway Quiz
-
(Included in full purchase)
5:7 Notice Timing to Individuals, Regulators and Credit Reporting Agencies
-
(Included in full purchase)
5:8 Providing of Notice to Individuals
-
(Included in full purchase)
5:9 Toolkit: General Notice Checklist
-
(Included in full purchase)
5:10 Methods of Notice Quiz
-
(Included in full purchase)
5:11 Providing Notice to Authorities
-
(Included in full purchase)
5:12 Notice to Government Authorities
-
(Included in full purchase)
5:13 Notice to Credit Reporting Agencies
-
(Included in full purchase)
5:14 Notice Requirements Based on Contractual Obligations
-
(Included in full purchase)
5:15 Vendors' Notice Obligations
-
(Included in full purchase)
5:16 Module Conclusion
-
(Included in full purchase)
-
6
Module 6: Post-Notice
-
(Included in full purchase)
6:1 Module Introduction
-
(Included in full purchase)
6:2 Overview of Post-Notice Risks
-
(Included in full purchase)
6:3 Regulator Inquiries
-
(Included in full purchase)
6:4 Regulator Inquiries Quiz
-
(Included in full purchase)
6:5 Handling Customer Inquiries
-
(Included in full purchase)
6:6 Toolkit Tell a Compelling Story
-
(Included in full purchase)
6:7 Toolkit: Creating a Post-Notice "Story"
-
(Included in full purchase)
6:8 Potential Safe Harbors
-
(Included in full purchase)
6:9 Toolkit: Safe Harbor Checklist
-
(Included in full purchase)
6:10 Module Conclusion
-
(Included in full purchase)
6:11 Course Conclusion
-
(Included in full purchase)
About the Instructor
This program was developed by Liisa Thomas, a law firm partner and adjunct professor at Northwestern Pritzker School of Law, who has spent her career helping lawyers and legal professionals navigate and respond to data security incidents of all kinds. As both a practicing partner and educator, Liisa has served as a trusted advisor to in-house counsel and C-suite executives at Fortune 500, multinational, and global companies. Based in the Chicago and London, Liisa brings a practical, business-focused, and cross-cultural perspective to helping organizations manage data security and incident response. Drawing from her extensive experience advising global companies through complex security events, she developed this self-paced course to equip professionals with the confidence and clarity to respond effectively to incidents and minimize risk.
Ready to Master Data Security & Incident Response?
Join now and gain the knowledge and confidence to mastering data security and incident response with ease.
$799.00