A Checklist outlining the steps for an organization to follow in responding to a breach of personal information. It addresses key steps to take concerning verification, containment, investigation and analysis, notification, and post-notification review.