Quick Navigation
Step 1: Identify & Contain Step 2: Assess the Breach Step 3: Notify Authorities Step 4: Notify Clients Step 5: Remediate & Improve Step 6: Document Everything Emergency Checklist ContactData Breach Response Plan
Because your trust matters.
At Equilibrium Consultants, we take your privacy and data security extremely seriously. While we work hard to prevent any unauthorized access, we’re also prepared — just in case something goes wrong.
Our Data Breach Response Plan ensures we act swiftly, responsibly, and transparently to protect your information, keep you informed, and restore trust.
Here’s exactly what we do if a data breach occurs:
Step 1: Identify and Contain
We immediately disconnect affected devices and systems to prevent further access. If a physical breach occurs (like theft), we secure the area. We also preserve all evidence to help investigate and resolve the issue.
- Disconnect affected computers and devices from the network.
- Secure physical locations if a physical breach (e.g., theft) occurs.
- Preserve evidence without altering the system further.
Step 2: Assess the Breach
We determine what type of data was compromised (such as Social Security Numbers, tax records, or bank information), how many people were affected, and how the breach occurred (malware, phishing, lost device, etc.).
- Determine what data was compromised (SSNs, bank info, client files).
- Estimate the number of individuals affected.
- Identify how the breach occurred (malware, phishing, insider threat, lost device).
Step 3: Notify Authorities
We follow the rules — fast.
We report the breach to the IRS Stakeholder Liaison right away. If the breach involves criminal activity, we contact local law enforcement. We also notify any relevant state agencies in line with data privacy laws.
- IRS Stakeholder Liaison (immediately)
- Local police (for theft or criminal acts)
- State agencies, if required (for data privacy laws)
Step 4: Notify Affected Clients
You’ll hear it from us — clearly and promptly.
- A description of what happened
- What kind of data was affected
- What we’ve done to contain it
- What steps you can take to protect yourself
- We’re here to help every step of the way
Step 5: Remediate and Improve
We don’t just fix — we improve.
- Fix vulnerabilities (update software, change passwords, patch systems).
- Review and improve security policies.
- Conduct retraining for staff if needed.
Step 6: Document Everything
Clear records. Full transparency.
Every step we take — from detection to resolution — is carefully documented. This helps us remain accountable and continually improve our security practices.
Record all actions taken: investigation, notifications, responses, and improvements.
Data Breach Emergency Checklist
For Internal Use Only
Step | Action | Completed (✔) |
---|---|---|
1 | Secure IT systems and physical files immediately | |
2 | Identify type and scope of breach | |
3 | Contact IRS Stakeholder Liaison | |
4 | Notify local law enforcement | |
5 | Notify affected clients in writing | |
6 | Offer guidance to clients (e.g., credit monitoring) | |
7 | Patch vulnerabilities | |
8 | Review and update security policies | |
9 | Conduct staff retraining (if necessary) | |
10 | Document the breach, actions taken, and lessons learned |
🔐 You’re in Safe Hands
We understand that your financial and personal data isn’t just information — it’s your identity, your livelihood, and your peace of mind.
That’s why we’ve created these procedures with your safety in mind.
If you have any questions about how we handle data or want to learn more about our security policies, we encourage you to contact us anytime at:
- Email: info@equilibriumconsultantsnj.com
- Website: www.eqconsultantsnj.com
- Phone: (732) 466-7035