How to Respond When a Data Breach Occurs