Wednesday, June 18, 2014

Netiquette IQ - A New Category of Netiquette You Probably Never Heard Before



There are varieties of etiquette and Netiquette according to certain topics such as job seeking, invitation and many others. I had never heard of data breach etiquette so I wanted to republish this right away.

==================================================
The new data breach etiquette you'd better know
  
June 16, 2014 | By David Weldon www.fiercecio.com
In a sobering commentary on the times, a new data breach etiquette has emerged--the expected steps you will take when you become the victim of a significant breach. Notice the use of the word "when" here, not "if."
"Breaches and data theft have become the new normal, to the point where a data breach etiquette has developed--a set of best practices that set the pros apart from the flailers," says an article at InfoWorld.
An estimated 2,164 data breach incidents, exposing 822 million records, occurred in 2013, the largest number ever says a report by the firm Risk Based Security. The number is expected to increase this year by all accounts.
The result is that "there was a time when incidents like this, involving the theft of data from a prominent firm, were capable of shocking the public and sending corporate managers and public relations departments into a tizzy. No longer," the article notes.
CIOs are offered a series of nine data breach rules to follow after their organization has suffered a data breach. They range from disclosure, to damage control to technology fixes. Follow them faithfully, and a CIO may survive the ordeal, the article says.
As offered up by InfoWorld, the nine rules include the following:
No. 1 – Disclose sooner rather than later. "The biggest mistake that organizations make is to sit on evidence of a security incident, only to have word spread by way of a third party."
No. 2 – Tell the whole truth. "Say what you know (and what you don't know) and take your lumps."
No. 3 – Get your crypto straight. "In the heat of a security incident, the specifics of the technology your company used to secure its data may seem like a small and irrelevant detail, but it's not."
No. 4 – Communicate across channels. "Your organization needs a consistent and coherent message to convey, and it needs to communicate it across all available channels: email, blog posts and press releases."
No. 5 – Customers come first, Wall Street second. "Companies that seem overly concerned about the impact of an incident on their stock price risk alienating customers who want reassurance that their data is being protected."
==========================================
In addition to this blog, I have authored the premiere book on Netiquette, " Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki


 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ Rider University and  PSG of Mercer County, NJ.

======================================