%PDF-1.4
%
1 0 obj
<>>>
endobj
2 0 obj
<>stream
uuid:6de5a9b9-4786-41f0-9178-3728356e9755
adobe:docid:indd:7b2358b5-749d-11df-8233-85143268dd67
xmp.id:16c9a2f7-56ed-fa42-ba0b-901814f34f7c
proof:pdf
xmp.iid:e9e044c3-186a-fe46-bd06-c01f331d56d6
xmp.did:1147a5d8-b538-044e-b0a7-f23afd16e6d8
adobe:docid:indd:7b2358b5-749d-11df-8233-85143268dd67
default
converted
from application/x-indesign to application/pdf
Adobe InDesign CC 2015 (Windows)
/
2016-10-13T10:58:13-04:00
2016-10-13T10:58:13-04:00
2016-10-13T10:58:15-04:00
2016-10-13T10:58:15-04:00
Adobe InDesign CC 2015 (Windows)
application/pdf
Federal Trade Commission
Data Breach Response: A Guide for Business
Data breach
cyber theft
personal information
breach response
Guidance from the FTC for responding to a data breach
Adobe PDF Library 15.0
False
endstream
endobj
5 0 obj
<>
endobj
3 0 obj
<>
endobj
8 0 obj
<>
endobj
9 0 obj
<>
endobj
10 0 obj
<>
endobj
21 0 obj
<>/ExtGState<>/Font<>/ProcSet[/PDF/Text]>>/TrimBox[0.0 0.0 396.0 612.0]/Type/Page>>
endobj
22 0 obj
<>/ExtGState<>/Font<>/ProcSet[/PDF/Text]>>/TrimBox[0.0 0.0 396.0 612.0]/Type/Page>>
endobj
23 0 obj
<>/ExtGState<>/Font<>/ProcSet[/PDF/Text]>>/TrimBox[0.0 0.0 396.0 612.0]/Type/Page>>
endobj
24 0 obj
<>/ExtGState<>/Font<>/ProcSet[/PDF/Text]>>/TrimBox[0.0 0.0 396.0 612.0]/Type/Page>>
endobj
25 0 obj
<>/ExtGState<>/Font<>/ProcSet[/PDF/Text]/Properties<>>>/TrimBox[0.0 0.0 396.0 612.0]/Type/Page>>
endobj
26 0 obj
<>/ExtGState<>/Font<>/ProcSet[/PDF/Text]/Properties<>>>/TrimBox[0.0 0.0 396.0 612.0]/Type/Page>>
endobj
39 0 obj
<>stream
H|Wrܸ}WQ AfS&ba|Sq_ޭ'۵7C^V&&W]Շ|<`>;s.+sus_l+ NOP\x2_cߝ<Of8a?'+rex~_\u{s8uO9wgsߝpھ1t|9]_ʗ6lQ+o_osUU^ҙ옗q c32놙y̮{6BNXD&ȆMBViV_|'ߧSm4d
;n 98l- 53,fPn/̝;Ȣp\"Zz+0pnMw{;a#Mb> o~lo^ٷ0mvtHLg}|OYx(zgsx5?=\{+8=Чйqth\\n~>ླྀ4q^R,=yum71/$W&6+{vͨ$Q~8u;y7#7'9ٽ@ #9p.nR[i. g֪ҶN0q[wy.DHt74sN+iIx+iu%ܗ;< Ʋ9|Ϛo>nV8|4T-ɎjTʆoOTC(yƚwoL]u*CLe$R.i |PӖ-ݚ;|-ֻ}?|*Dƪ6^+q)X<zh
}qq0M*Si6ocʑ?ʆQƕlnGl%&{*ʖe5?`q/qTCMI,ճA1:%yy)
2H#1ثe-^alt2P,%N&^BjB*ki6
uXyrhk̆PFb21TB_