Incident Response Runbook
A practical guide to incident response runbook for privacy law practitioners.
What This Lesson Covers
Incident Response Runbook is a key topic within Data Breach Response. In this lesson you will learn the underlying privacy law doctrine, the controlling statutory and regulatory authorities, how to apply the rules to real fact patterns, and the open questions practitioners are actively litigating. By the end you will be able to engage with incident response runbook in real privacy work with confidence.
This lesson belongs to the Privacy Operations & Specialized category of the Data Privacy Law track. Privacy law is one of the most active and most fragmented practice areas globally. Understanding the doctrinal foundations is what lets you reason about novel issues across jurisdictions, not just memorize current rules.
Why It Matters
Master data breach response. Learn incident response runbooks, multi-jurisdictional notification timelines, regulator notification (GDPR 72-hour, state laws), and class action defense.
The reason incident response runbook deserves dedicated attention is that the gap between practitioners who understand the doctrinal foundations and those who only know surface-level rules is widening as new privacy laws roll out worldwide every quarter. Compliance officers, privacy counsel, and engineers who can reason from first principles will be far ahead of those who can only cite current statutes. This material gives you the framework to keep pace as privacy law evolves.
How It Works in Practice
Below is a practical privacy compliance framework for incident response runbook. Read through it once, then think about how you would apply it to a real client matter or product decision.
# Data breach response runbook (multi-jurisdictional)
INCIDENT_PHASES = [
"1. DETECT (security alert, user complaint, vendor notification)",
"2. CONTAIN (limit scope of compromise)",
"3. ASSESS (what data, whose, how, when)",
"4. NOTIFY (regulators, affected individuals, BAs)",
"5. REMEDIATE (technical fixes, additional safeguards)",
"6. POSTMORTEM (root cause, lessons learned, controls update)",
]
NOTIFICATION_TIMELINES_MAJOR_REGIMES = {
"GDPR_Art_33": "DPA notification: 'without undue delay and where feasible, within 72 hours'",
"GDPR_Art_34": "Affected individuals: 'without undue delay' if high risk",
"HIPAA_45_CFR_164_400": "Individuals: 60 days; HHS: 60 days for >500, annual for <500",
"CCPA_CIA_civil_code_1798_82": "Individuals: 'in the most expedient time possible and without unreasonable delay'",
"NY_SHIELD": "Individuals + AG + 3 consumer reporting agencies (if applicable)",
"Most_state_laws": "30-90 days typical",
"PIPL_China": "Notify regulator immediately when 'serious harm' likely",
"LGPD_Brazil": "Notify ANPD and affected individuals within 'reasonable time'",
}
FORENSIC_PRESERVATION = [
"Preserve all logs (system, application, network, security)",
"Preserve forensic images (memory + disk)",
"Document chain of custody",
"Engage outside counsel early to preserve privilege",
"Engage breach coach + forensic firm via outside counsel",
]
CLASS_ACTION_DEFENSE_PREP = [
"Identify all jurisdictions with potential class members",
"Prepare notification list with addresses (for opt-out class actions)",
"Document mitigation steps taken for affected individuals",
"Engage with insurer (Tech E&O / cyber policy)",
"Document cooperation with regulators (mitigates damages)",
]
Step-by-Step Analytical Approach
- Identify scope and applicability — Privacy laws have specific scope triggers (territorial, sectoral, threshold-based). Confirm whether the law applies before mapping obligations.
- Map data flows and roles — Document what personal data is collected, where it flows, who processes it, and what role each actor plays (controller, processor, joint controller, third party).
- Determine lawful basis or exemption — Each processing activity needs a legal basis. Document the basis, the necessity analysis, and any DPIA required.
- Operationalize the obligations — Privacy laws impose concrete duties: notice, consent, data subject rights handling, breach notification, retention, transfers. Build them into the SDLC.
- Build audit-ready evidence — Privacy regulators expect evidence of compliance. Maintain ROPA, DPIAs, training records, breach logs, DSR responses, and policy versions.
When This Topic Applies (and When It Does Not)
Incident Response Runbook applies when:
- You handle personal data subject to the relevant statute or regulation
- The territorial, sectoral, or threshold scope of the law captures your activities
- The remedies or rights at stake are recognized by the relevant regime
- You need to demonstrate compliance to regulators, customers, or in litigation
It does not apply when:
- You truly do not handle personal data subject to the law (verify carefully)
- A different privacy law better fits the facts
- The data falls within a recognized exemption (research, journalism, employment in some regimes)
- You are purely processing anonymized data outside the regime's scope
Practitioner Checklist
- Have you identified every privacy law that applies to this data flow?
- Is the lawful basis for each processing activity documented and defensible?
- Are data subject rights handled within the required timelines?
- Are international transfers backed by an appropriate transfer mechanism?
- Is your breach notification process tested and runbook-ready?
- Have you documented the analysis with citations for future reference?
Disclaimer
This educational content is provided for general informational purposes only. It does not constitute legal advice, does not create an attorney-client relationship, and should not be relied on for any specific legal matter. Privacy law varies by jurisdiction and changes rapidly. Consult qualified privacy counsel licensed in your jurisdiction for advice on your specific situation.
Next Steps
The other lessons in Data Breach Response build directly on this one. Once you are comfortable with incident response runbook, the natural next step is to combine it with the patterns in the surrounding lessons — that is where doctrinal mastery turns into practitioner competence. Privacy law is most useful as a system, not as isolated rules.
Lilly Tech Systems