Somewhere around minute 17 of a new incident, someone says it: “We have 72 hours.”

It’s said with the same confidence people use when they announce the score from last night’s hockey game. The problem with this statement is that breach notification timelines are not one universal rule. They vary by jurisdiction, by data type, by whether there’s risk of harm, by whether the data was encrypted, and by whether the incident even meets the legal definition of a reportable breach.

Which means the most dangerous thing you can do during an incident is cling to a single number and assume it applies to everything.

Also, even if 72 hours is relevant to your risk landscape, that doesn’t mean you should blast half-baked facts to consumers on day three. Urgency is real, but so is accuracy. A rushed notice that’s wrong creates its own problems, including follow-up notices, angry customers, and credibility loss with regulators and partners.

72‑hours is not a panacea

The ‘72 hours’ idea sticks because it’s simple. It gives people a number to hold onto when everything else is uncertain. In reality, different laws use different standards. Some laws require notice without unreasonable delay, some specify outer deadlines, and some focus on notice to regulators versus consumers. Even within a single incident, your obligations can differ by audience and jurisdiction.

So, use 72 hours as a reminder to move fast, not as a universal rule. Your real job is to build a timeline based on facts, jurisdictions, and your decision workflow.

What ‘reportable breach’ means in practice

In most U.S. state frameworks, a reportable breach is a narrowly defined incident that typically requires unauthorized access to or acquisition of specific types of personal information, often linked to a person’s name, combined with certain identifiers like account credentials or government IDs. Many states also recognize exceptions for encrypted data, good-faith employee access, or lack of risk of harm.

What does this mean in reality? you need facts before you can decide notification. The legal question depends on the incident facts. The operational challenge is collecting those facts quickly and documenting how you evaluated them.

This is where the specific data elements matter. Many state laws focus on specific combinations, such as name plus Social Security number, driver’s license number, financial account numbers with access codes, and in many cases credentials that would allow access to an account. Some newer laws cover additional identifiers.

The operational point is not that you need to memorize every element. It’s that your investigation should explicitly identify which elements were involved. “PII was exposed” is not a useful finding. “Names and account credentials were exposed” is actionable.

Common exclusions and safe harbors you should know exist

Even when personal data is involved, many state frameworks recognize that not every exposure requires notification.

Common exclusions/safe harbors include:

  • Encryption: if the data was encrypted and the key was not compromised, notification may not be required in many scenarios.

  • Good-faith employee acquisition: if an employee accessed data in good faith for legitimate purposes and did not further misuse or disclose it, some laws treat that differently.

  • Risk-of-harm analyses: some jurisdictions allow a documented determination that misuse is unlikely based on certain factors.

These aren’t get-out-of obligations cards but use it as a reminder to document what you evaluate instead of defaulting to assumptions.

The first 48 hours are about facts and governance

Your first 48 hours should be about building a defensible fact base and activating the right governance.

Key facts you need early include:

  • what happened (attack vector or error),

  • what data was involved,

  • whose data it was (customers, employees, minors),

  • how many people were affected (even rough ranges),

  • what jurisdictions are implicated,

  • whether the data was encrypted or otherwise protected,

  • whether the data was actually accessed/exfiltrated, and

  • what systems/vendors are involved.

At the same time, you need to cover the following governance bases:

  • who is incident commander,

  • who is legal lead,

  • who owns communications,

  • who can approve notifications, and

  • who is maintaining the decision log.

If you do nothing else, create a table of the facts and update it as the investigation evolves. List each data element, where it was stored, whether it was encrypted, whether it was accessed/exfiltrated, and the preliminary data subject count (based on jurisdiction if you have that information). This table becomes the backbone for legal analysis and communications.

Also make sure to engage your insurance process early if you have cyber coverage. Insurers often require prompt notice and may have panel counsel or forensic requirements. You don’t want to discover the policy conditions after you’ve already hired vendors.

Different audiences, different communications

Breach response often involves multiple audiences, including affected individuals, regulators/attorneys general, consumer reporting agencies, business partners, enterprise customers, and sometimes law enforcement.

Each audience has different expectations and requirements. Customers want clarity and support. Regulators want timelines, impact, and remediation. Partners want confirmation about their data and contractual compliance. Law enforcement may want containment and evidence preservation. Your incident communications playbook should separate these audiences, so you don’t accidentally use one audience’s language for another.

Why notification decisions get messy

Breach notification decisions get messy because they often require squishy assessments of risk and consequences, and both the risks and consequences may mean different things for different roles inside your organization. Security teams want containment and technical accuracy. Legal teams want defensibility and privilege. Communications teams want clarity and consistency. Executives want risk and options. Meanwhile, customers want answers yesterday.

And this is all complicated by the reality that early facts are usually incomplete. That’s why a good incident process doesn’t pretend certainty exists. It documents uncertainty, tracks what is known, and shows how decisions evolve as facts mature.

Another reason incident response gets messy is that companies confuse ‘incident communications’ with ‘breach notification.’ Incident communications can include internal updates, customer reassurance, and partner notifications. Breach notifications have legal content requirements and specific audiences. Mixing these too early creates inconsistent messaging.

A defensible notification approach

You do not need to memorize every state breach law to run a defensible notification process. It wouldn’t work anyway, because the laws are constantly changing, so basing your response on a legal spreadsheet from 6 months ago isn’t a great idea. Instead, focus on a structured workflow.

Step 1: Determine whether the incident is plausibly a reportable breach based on the current set of data elements and access/acquisition facts.

Step 2: Identify potentially implicated jurisdictions which are those jurisdictions where impacted individuals reside.

Step 3: Use a decision matrix or cheat sheet to identify key content requirements and any unusual restrictions and make sure to update any research to ensure recent changes have been captured.

Step 4: Draft notifications only once you have a stable fact base or be explicit about what is still under investigation if early notice is required.

Step 5: Log decisions, including why you chose to notify or not notify, and the basis for timelines.

This is also where exceptions matter. Some states include a risk-of-harm analysis; some do not. Many include safe harbors for encrypted data. Many include exceptions for good-faith acquisition by employees where data is not further misused.

Your decision workflow should explicitly document whether an exception applies and why, because your future self will need to explain the decision if questioned.

Notification content

Even though content requirements vary, most consumer notices include a predictable core that includes a description of what happened, what information was involved, what the company is doing, what the individual can do, and how to contact the company.

Some states add specific requirements (like offering credit monitoring in certain contexts, or including specific identity theft prevention resources). Others restrict content. The practical takeaway is to use templates and checklists, and don’t wing it.

One operational nuance is that some jurisdictions have quirks about what can or cannot be included. For example, some states restrict including certain details in notices to regulators, or limit the content that can be provided in consumer notices in order to reduce harm or avoid tipping off attackers. If you operate nationwide, this is why templates and legal review matter. The practical solution is modular drafting. Write a baseline notice that covers the common elements, then add jurisdiction-specific modules where needed.

Operational tips that reduce regret

  1. Assign a single owner for the notification tracker and jurisdiction log. This is how you prevent version chaos when multiple teams draft and revise in parallel.

  2. Coordinate with vendors early. If a vendor is involved, you need facts and timelines from them. Vendor delays are common reasons notification timelines get stressed.

  3. Preserve evidence. Notification decisions are defendable when you can show the facts you relied on. Keep investigation summaries, logs of vendor communications, and the decision log.

  4. Don’t forget internal stakeholders. Employee communications matter, especially if employee data is involved. And HR often becomes a critical partner when workforce trust is at stake.

  5. Coordinate with customer support. When notices go out, support volume spikes. If support is unprepared, you create a second incident: inconsistent answers to affected individuals.

  6. Plan for credit reporting agency notifications and identity theft resources when relevant. Even if not required in every case, having these blocks ready reduces drafting friction.

  7. And yes, practice. A tabletop exercise that includes a notification decision inject is one of the fastest ways to identify missing owners, missing templates, and missing evidence practices.

The decision log is your shield

If you want one artifact that makes your breach response defensible, it’s the decision log.

A good decision log captures what you knew at the time, what you didn’t know, what you decided, why you decided it, and what you planned to do next. It should also capture when decisions changed as facts evolved. This protects you from hindsight bias. After an incident, people forget uncertainty existed. The decision log is your proof that you acted reasonably based on available information.

Where the micro‑tool fits

The micro‑tool below is a first‑48‑hours planner. It’s designed for the moment when you need to gather facts, assign owners, and build your notification timeline without prematurely committing to a legal conclusion.

Use it as an incident intake companion, and as the start of your decision log.

Become a paid subscriber to get access to all of the mini tools that we publish with each post. For instance, this post includes a First 48 Hours Notification Planner.

Finally, reminder that the opinions expressed in this article are the opinion of The Privacy Design Lab. They are not legal advice, and no attorney-client relationship is formed by reading this article or downloading the First 48 Hours Notification Planner. If you need to consult legal counsel, you can book a consult with ARLA Strategies or other legal counsel you trust!

If you’re tired of privacy advice that only works in theory, you’re in the right place.

The Privacy Design Lab exists for people who want to practice privacy, not just talk about it. It focuses on practical, repeatable ways teams actually learn. We offer hands-on workshops, downloadable systems, and the Design Studio community where teams and practitioners can go deeper. Paid Fieldnotes subscribers get access to our full archive, plus supporting materials you can actually use.

If that sounds like your kind of work, we’d love to have you.

Keep Reading