
DATA SECURITY BREACH PROCEDURE (Jan 2026)
Entities: LD Consultores C.A. & León & Associated Attorneys at Law Ltd.
Objective: To ensure a consistent and effective response to any actual or suspected breach of data security.
1. Definition of a Data Security Breach
A data security breach is any incident that leads to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal or sensitive data. Examples include:
- Loss or theft of physical records or hardware (laptops, mobile phones).
- Unauthorized access to cloud-based payroll or legal systems.
- Sending sensitive information to an incorrect recipient.
- Cyberattacks, such as ransomware or phishing, that compromise data integrity.
2. Immediate Response (Containment and Recovery)
Upon discovery of a suspected breach, the following steps must be taken immediately:
- Initial Internal Reporting: Any staff member discovering a potential breach must report it immediately to the firm’s Compliance Officer or Managing Partners.
- Containment: The technical team will take immediate steps to stop further data loss, such as isolating compromised systems, changing passwords, or suspending affected accounts.
- Recovery: Where possible, the team will attempt to recover lost data from secure, encrypted cloud backups.
3. Assessment of Risk
The Compliance Officer will conduct a formal investigation to determine:
- The Type of Data Involved: Whether the breach affects sensitive payroll info, tax records, or legal documentation.
- The Scale of the Breach: The number of individuals (candidates, employees, or clients) affected.

- The Potential Impact: Assessing the risk of financial loss, identity theft, or reputational damage to affected parties.
4. Notification Protocol
Notification is governed by the risk to individuals and jurisdictional legal requirements:
- To the Regulator (ICO): For UK-based data, if the breach is likely to result in a risk to individuals, it must be reported to the Information Commissioner’s Office (ICO) within 72 hours of discovery.
- To Affected Individuals: If the breach is likely to result in a high risk to the rights and freedoms of individuals, they must be notified directly and without undue delay.
- To Business Partners: We will notify relevant clients or partners in accordance with our contractual Data Protection Agreements (DPAs).
5. Documentation and Post-Incident Review
Regardless of whether notification is required, all breaches will be formally documented in an Internal Breach Register:
- Record Keeping: We will document the facts of the breach, its effects, and the remedial actions taken.
- Evaluation: Following a breach, a “Post-Incident Review” will be conducted to identify weaknesses in our Information Security Management System (ISMS).
- Action Plan: Policies and training programs will be updated to prevent a recurrence of the incident.
Authorized by: Managing Partners LD Consultores & L&A Attorneys at Law