
How To Prevent Business Email Compromise (BEC) Scams
What Is Business Email Compromise? It goes by several names, but they all describe the same scam. Business email …

Learn how to meet your data breach compliance requirements and avoid costly penalties.
• Data breach compliance spans GDPR, HIPAA, CCPA, PCI DSS, and SEC rules. You likely fall under multiple frameworks, so build your program around the strictest one
• The HIPAA breach notification rule gives you just 60 days to notify affected individuals. If 500+ people are affected, you also have to notify HHS and local media
• A documented data breach response plan is a legal requirement under most frameworks, not just a best practice
• Most breaches start with stolen credentials that sat exposed for weeks. Continuous monitoring catches them in that window, before they trigger costly reporting requirements
The average cost of a data breach is $4.44 million globally, according to IBM’s 2025 Cost of a Data Breach Report. In the US, it’s $10.22 million.
Getting compliance wrong doesn’t just mean fines. It means lawsuits and regulatory scrutiny that lasts years.
Here’s what you need to know about data breach compliance and how to stay ahead of your obligations.
You’ll see this term in vendor contracts and regulatory filings. Here’s what it actually means.
Data breach compliance is the process of meeting all legal and regulatory requirements for protecting sensitive data and responding to security incidents. It covers everything from preventive security controls to breach notification timelines and post-incident reporting.
Data breach compliance isn’t just about what you do after an incident. It starts long before anything goes wrong.
Most regulations require you to have specific security controls and response procedures in place at all times. When a breach happens, regulators don’t just ask what went wrong. They ask what you had in place to prevent it.
The stakes are high. Identity theft affects millions of people every year, and it’s the primary reason governments keep tightening data protection laws. If your company stores personal data, you’re responsible for keeping it safe and following the rules when something goes wrong.
Regulations are also getting more complex, not simpler. New privacy laws are passing every year at both the state and federal level. What counted as “reasonable security” five years ago won’t satisfy today’s regulators. Staying compliant means staying current.
Several overlapping regulations govern how you handle data and respond to breaches. Here are the ones that matter most.
The General Data Protection Regulation applies to any company handling EU residents’ data, regardless of where you’re based. It requires breach notification to supervisory authorities within 72 hours of becoming aware of the incident. Fines can reach 4% of global annual revenue or 20 million euros, whichever is higher.
GDPR also requires data protection impact assessments for high-risk processing and mandatory appointment of a Data Protection Officer in certain cases. If you sell to European customers or have EU employees, GDPR likely applies to you. For a deeper look at global notification requirements, see our guide on data breach notification laws.
California’s privacy laws give residents the right to know what data you collect and request deletion. After a breach, consumers can sue for statutory damages between $100 and $750 per person per incident. With millions of California residents in most customer databases, that adds up fast.
The CPRA expanded these protections in 2023 by creating the California Privacy Protection Agency and adding requirements around sensitive personal information. Other states including Virginia and Colorado have since passed similar laws.
The HIPAA breach notification rule requires healthcare organizations and their business associates to notify affected individuals within 60 days of discovering a breach involving unsecured protected health information. Breaches affecting 500 or more people must be reported to the Department of Health and Human Services and local media. Penalties range from $100 to $50,000 per violation.
The Payment Card Industry Data Security Standard applies to every company that processes or stores credit card data. Non-compliance can result in fines from $5,000 to $100,000 per month. You could also lose your ability to process cards altogether.
Publicly traded companies must disclose material cybersecurity incidents within four business days of determining the incident is material. The SEC also requires annual disclosure of your cybersecurity risk management processes. You can read the full SEC cybersecurity disclosure rules on their site.
The Federal Trade Commission enforces data protection through its authority over unfair or deceptive practices. Even if no specific privacy law applies to your industry, the FTC can take action if your security practices don’t match your privacy promises. The agency has brought cases against companies for failing to implement reasonable security measures and misrepresenting data practices.
When the FTC settles an enforcement action, the agreement typically requires you to pay for independent security audits every year for 20 years. The FTC’s data security guidance outlines what they expect from your security program. Recent enforcement actions have targeted companies for poor credential security and failure to patch known vulnerabilities. The FTC has made it clear that “we didn’t know” isn’t a valid defense.
All 50 US states have their own breach notification laws. Requirements vary on what counts as a breach and how fast you need to notify. Some states require notification within 30 days. Others give you 60 or 90. A few don’t specify a timeline at all beyond “without unreasonable delay.”
States like New York (SHIELD Act) and Virginia (VCDPA) have added broader data protection requirements beyond just notification. Several states now require companies to implement “reasonable security measures” and conduct regular risk assessments. If you have US customers, you need to track the strictest requirements across every state they’re in. Most companies just comply with the toughest standard rather than managing 50 different policies.
Before building your program, make sure you understand the core concept driving all of these regulations.
Breach notification rule refers to any legal requirement that compels you to inform affected individuals and regulators within a set timeframe after discovering a data breach. Some rules also require law enforcement notification. Each regulation has different triggers and timelines.
A compliance program isn’t a one-time project. It’s an ongoing set of policies and processes that keep you aligned with your regulatory requirements.
Here’s what you need in place before a breach happens:
Data inventory and classification. You can’t protect what you don’t know you have. Map every system that stores personal or sensitive data, including cloud services and third-party platforms. Classify it by type and sensitivity level. This directly feeds your reporting requirements since different data types trigger different rules. Healthcare records and financial data each have their own regulatory requirements.
Written policies and procedures. Document your data protection measures and incident response procedures. Regulators will ask for these during an investigation. If they don’t exist in writing, they don’t exist.
A data breach response plan. This is a legal requirement under most frameworks, not just a best practice. Your plan should cover containment and investigation, plus notification and remediation steps. It should name specific team members responsible for each step and define when to contact law enforcement. Include pre-drafted notification templates for different breach scenarios so you’re not writing them under pressure.
Employee training. Train your team on data handling procedures and phishing recognition. Document every training session. Regulators look for proof that you trained staff, not just that you had a policy.
Vendor risk management. Your regulatory responsibilities don’t stop at your company’s walls. Assess and monitor the security practices of every third-party vendor that touches your data. Include breach notification requirements in your vendor contracts. Require vendors to notify you within a specific timeframe if they experience a breach that affects your data. Many of the largest breaches in recent years originated through supply chain compromises.
Regular risk assessments. Conduct formal risk assessments at least annually, or whenever you make major changes to your systems or data handling practices. Document findings and track remediation timelines. This shows enforcement agencies you’re actively managing risk, not waiting for something to go wrong. Many frameworks, including HIPAA and PCI DSS, require documented evidence that assessments were completed and findings were addressed.
Incident logging and metrics. Track every security incident, even minor ones that don’t trigger notification requirements. This gives you trend data to spot recurring weaknesses and proves you’re paying attention during audits. It also helps your data breach lawyer build a stronger defense if you face litigation after an incident.
When a breach occurs, having a documented incident response plan keeps things under control and protects you from additional regulatory penalties. Here’s what to do:
The best way to handle compliance is to prevent data breaches from happening in the first place. Technical controls are your strongest line of defense because they work consistently without relying on human judgment.
Key data breach protection measures to put in place:
These controls don’t just help you prevent data breaches. They’re also what the FTC, SEC, and HHS want to see when they evaluate your compliance program. Having them in place before an incident can reduce your legal exposure and potential fines.
Regular penetration testing and vulnerability scanning round out a strong prevention strategy. Document every assessment and track remediation timelines. After an incident, investigators will look at whether you were actively testing your defenses or just assuming they worked.
Data breach compliance is the set of legal and regulatory requirements you must follow to protect sensitive data and respond properly when a breach occurs. This includes maintaining security controls and following breach notification rules. Some regulations also require you to cooperate with law enforcement.
Breach notification rules are laws that require you to notify affected individuals and regulators after a data breach. Some also require law enforcement notification. Timelines vary widely. GDPR requires notification within 72 hours. HIPAA allows up to two months. All 50 US states have their own notification laws with different triggers and deadlines.
You should consult a data breach lawyer if your company handles large volumes of personal data or operates across multiple jurisdictions. A lawyer can help you navigate overlapping state and federal requirements and manage regulatory investigations. For smaller companies, outside counsel on retainer is often more cost-effective than full-time legal staff.
The HIPAA breach notification rule requires covered entities and business associates to notify affected individuals within 60 days of discovering a breach of unsecured protected health information (PHI). Breaches affecting 500 or more people must also be reported to the Department of Health and Human Services (HHS) and local media. Smaller breaches can be reported annually.
Start by assembling your incident response team with IT security and legal counsel, plus senior leadership. Document your reporting requirements for every jurisdiction you operate in. Define escalation procedures and containment steps. Test the plan with tabletop exercises at least twice a year. See our data breach response guide for a full walkthrough.
Non-compliance penalties vary by regulation but can be severe. GDPR fines reach up to 4% of global annual revenue. HIPAA fines can reach $1.5 million per violation category. Beyond fines, you face class-action lawsuits from affected individuals and mandatory audits. FTC consent decrees can require 20 years of third-party security reviews.

What Is Business Email Compromise? It goes by several names, but they all describe the same scam. Business email …

Insider Threat Data Security Best Practices
What Is Employee Data Theft? The term covers more than you might think. It’s not just a disgruntled employee walking out …