LoanBot LLC Data Breach Response Plan

Effective Date: November 10, 2025

Owner: Incident Response Team (IRT), LoanBot.com
Contact: info@loanbot.com
Classification: Restricted

1. Purpose

This Data Breach Response Plan (DBRP) defines the process to detect, contain, eradicate, recover from, and report security incidents involving unauthorized access, disclosure, alteration, or destruction of Confidential or Restricted data on https://www.loanbot.com/, in compliance with U.S. federal and state laws (HIPAA, GLBA, CCPA/CPRA, NY SHIELD, etc.).

2. Scope

Applies exclusively to:
  • Incidents impacting PII, NPI, PHI, SSN, financial account numbers, or authentication credentials.
  • All personnel, contractors, and third-party vendors

3. Definitions

Term Definition
Data Breach Unauthorized acquisition of unencrypted PII likely to cause substantial harm (per state laws).
Incident Any event compromising CIA triad.
IRT Incident Response Team.
RPO ≤ 4 hours
RTO ≤ 12 hours (critical systems)

4. Incident Response Team (IRT)

Role Responsibility
IRT Lead (CISO) Overall coordination, exec escalation
Technical Lead Containment, forensics
Legal Counsel (U.S.) State AG liaison, HIPAA/GLBA compliance
Comms/PR U.S. customer & media messaging
Customer Support (U.S.) Impacted user liaison

5. Incident Severity Levels

Level Criteria Notification Timeline
SEV-1 (Critical) >1,000 records, SSN/financial data, ransomware Immediate (exec + board)
SEV-2 (High) 100–1,000 records, credential exposure Within 1 hour
SEV-3 (Medium) <100 records, no SSN Within 4 hours
SEV-4 (Low) Internal compromise, no PII Within 4 hours

6. Response Phases (NIST 800-61)

Phase 1: Preparation (Ongoing)
  • Tools: Splunk (U.S. region), CrowdStrike Falcon, forensic VM (us-east-1).
  • Playbooks: Credential dump, SSN exposure, ransomware.
  • Backups: Daily, encrypted, immutable (S3 Object Lock – us-west-2), tested quarterly.
  • Comms Templates: English only (state-specific variants).
Phase 2: Identification (≤ 15 mins to triage)
Action Owner Tool
Alert ingestion SOC/SIEM Splunk SOAR
Initial triage Technical Lead CrowdStrike console
Scope assessment IRT AWS GuardDuty, CloudTrail, DB audit logs
Decision: Breach? Yes → Activate DBRP IRT Lead

Indicators:

  • Mass SSN downloads
  • ACH/wire data exfil
  • Ransom note in S3 (us-east-1)
Phase 3: Containment (≤ 1 hour for SEV-1)
Short-Term Long-Term
Isolate VPC (disable egress) Rebuild via Terraform
Revoke tokens (Okta SCIM) Rotate all Vault secrets
Block IPs (WAF + AWS Network Firewall) Enforce MFA globally
Snapshot evidence
Phase 4: Eradication (≤ 24 hours)
  • Remove malware.
  • Patch root cause.
  • Mandatory password + MFA reset for affected users.
  • Re-validate all service principals.
Phase 5: Recovery (≤ 12 hours RTO)
  • Restore from last clean backup (us-west-2).
  • Canary rollout: 10% → 100% traffic.
  • 72-hour heightened monitoring.
Phase 6: Post-Incident (≤ 72 hours)
Deliverable Owner Deadline
Root Cause Analysis (RCA) Technical Lead +48h
Impact Report (records, states, data types) Legal +60h
Lessons Learned IRT Lead +72h
Executive Briefing CISO +72h

7. Legal & Regulatory Notifications

Law Trigger Deadline Channel
CCPA/CPRA >500 CA residents As soon as practicable Email + website
NY SHIELD Act NY resident PII As soon as practicable Certified mail to NY AG
Massachusetts 201 CMR 17 MA resident PII As soon as practicable MA AG + OCR
HIPAA (if PHI) Unsecured PHI 60 days to HHS OCR OCR portal
GLBA (financial data) Customer financial info Prompt to CFPB CFPB portal
All 50 States Per state breach laws Varies (30–60 days) See Appendix B

8. Customer Communication

  • English only, clear, actionable.
  • What happened | What data | What we’re doing | What you should do.
  • Free identity monitoring (Experian IdentityWorks) if SSN/financial data exposed.

9. Evidence Preservation

  • Chain of Custody (DocuSign).
  • Forensic images: S3 (us-east-1, Glacier Instant Retrieval, 180-day legal hold).
  • Litigation Hold: Auto-triggered on SEV-1.

10. Third-Party Coordination

Partner Role SLA
AWS Enterprise Support Logs 1-hour

11. Testing & Maintenance

  • Tabletop Exercise: Quarterly (next: February 12, 2026).
  • Full Simulation: Annually.
  • Plan Review: After every incident or annually.

12. Appendices

Appendix A: U.S. Breach Notice Template (English)
Subject: Security Incident Notification – Action Required

Dear [Name],

On [date], we detected unauthorized access to our systems that may have exposed your [data types, e.g., SSN, mortgage docs].

**Immediate Actions:** 1. Change your password on LoanBot.com and any site using the same. 2. Enable two-factor authentication (2FA).

Support: info@loanbot.com

Sincerely, Security Team

LoanBot.com
Appendix B: State Notification Matrix (Top 10 by User Volume)
State Threshold Deadline AG Portal
CA >500 Prompt oag.ca.gov
NY 1 Prompt ag.ny.gov
TX 1 Prompt texasattorneygeneral.gov
FL 1 30 days myfloridalegal.com
IL 1 Prompt ag.state.il.us

(Full 50-state table maintained in Confluence – restricted access)