{"id":49608,"date":"2026-04-24T16:52:28","date_gmt":"2026-04-24T20:52:28","guid":{"rendered":"https:\/\/www.millerthomson.com\/?p=49608"},"modified":"2026-04-24T16:52:31","modified_gmt":"2026-04-24T20:52:31","slug":"data-protection-in-the-age-of-ai-breach-management-strategies-for-organizations","status":"publish","type":"post","link":"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-protection-in-the-age-of-ai-breach-management-strategies-for-organizations\/","title":{"rendered":"Data protection in the age of AI: Breach management strategies for organizations"},"content":{"rendered":"\n<p>The recent launch of <a href=\"https:\/\/www.anthropic.com\/project\/glasswing\">Project Glasswing<\/a> on April 7, 2026 signals a broader shift in the cybersecurity landscape as AI is rapidly increasing both the speed and sophistication of cyber threats.<\/p>\n\n\n\n<p>Specifically, Project Glasswing was initiated to provide a specified group of organizations with pre\u2011launch access to Anthropic\u2019s <em>Mythos<\/em> tool to help secure critical software before its vulnerabilities can be exploited.<\/p>\n\n\n\n<p>The reason for the launch of this project stemmed from the discovery of how powerful Mythos was in terms of its ability to hack existing systems and identify previously undiscovered software vulnerabilities. Rather than releasing Mythos publicly, Anthropic limited access to vetted organizations to reduce the likelihood of misuse by malicious actors.<\/p>\n\n\n\n<p>This article discusses the potential impact of the development of Mythos and similar tools on Canadian organizations, and the steps they might consider taking to prepare for this new world of AI\u2011powered cybersecurity risks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Data protection and cybersecurity laws in Canada<\/h2>\n\n\n\n<p>Canadian organizations are subject to a host of data protection, privacy, and cybersecurity laws, depending on their business activities, location, and sector. Commonly, this includes:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>the <a href=\"https:\/\/laws-lois.justice.gc.ca\/eng\/acts\/p-8.6\/\"><em>Personal Information Protection and Electronic Documents Act<\/em><\/a> (\u201cPIPEDA\u201d);<\/li>\n\n\n\n<li>applicable provincial private\u2011sector privacy laws; and<\/li>\n\n\n\n<li>extra\u2011territorial laws such as the GDPR, or sector\u2011specific regulations, including the <a href=\"https:\/\/www.osfi-bsif.gc.ca\/en\/guidance\/guidance-library\/technology-cyber-security-incident-reporting\">OSFI Technology and Cyber Incident Reporting Advisories<\/a> applicable to federally regulated financial institutions and certain pension plans.<\/li>\n<\/ul>\n\n\n\n<p>Beyond regulatory compliance, organizations must also be in a position to protect their operations and services for customers and other stakeholders. Cybersecurity concerns pose risks not only to data, but also to business continuity and operations. Data breaches and cyber incidents can cause reputational, emotional, financial, and even physical harms to those affected. Needless to say, they represent enterprise\u2011level risks.<\/p>\n\n\n\n<p>While these risks have been present for many years, they are now evolving due to AI\u2019s susceptibility to being leveraged by bad actors to accelerate, scale, and execute attacks in ways that were previously not possible.<\/p>\n\n\n\n<p>Just as organizations are increasingly using AI to create and analyze content, criminals are using AI to generate malicious code, automate attacks, craft more convincing phishing and spear\u2011phishing campaigns, and\u2014through tools like Mythos\u2014discover and exploit existing and previously unknown software vulnerabilities. The concern is that these vulnerabilities may be identified and exploited before patches or updates can be developed and deployed.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What should organizations be thinking about in the AI\u2011powered cybersecurity threat landscape?<\/h2>\n\n\n\n<p><strong>From a legal perspective<\/strong>, organizations are required to use reasonable technical, organizational, and physical safeguards to protect personal information.<\/p>\n\n\n\n<p><strong>From an operational and financial perspective<\/strong>, they must safeguard their business and their \u201ccrown jewels\u201d of data, including confidential information, intellectual property, and customer data. These underlying obligations have not changed. What <em>is<\/em> changing is what it takes to meet them effectively.<\/p>\n\n\n\n<p>The following is not a comprehensive or exhaustive list, but highlights key considerations for organizations seeking to protect their operations and data in an AI\u2011enabled threat environment:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Knowledge.<\/strong> Be aware of emerging AI\u2011driven threats and assess how they may impact your organization\u2019s security posture.<\/li>\n\n\n\n<li><strong>Patch.<\/strong> Software patching routines may need to be reconsidered given the speed at which vulnerabilities can now be discovered and exploited. Greater emphasis may be required on continuous or ongoing patching rather than traditional cyclical approaches.<\/li>\n\n\n\n<li><strong>Train.<\/strong> AI enables more sophisticated social engineering, phishing, and spear\u2011phishing attacks. Training should not be a \u201ctick\u2011the\u2011box\u201d exercise, but should meaningfully increase staff awareness and their ability to detect and escalate concerns.<\/li>\n\n\n\n<li><strong>Detection.<\/strong> Organizations should assume that system penetration is possible, even with strong preventative controls in place. Implementing and actively monitoring effective detection tools is increasingly essential.<\/li>\n\n\n\n<li><strong>Incident response.<\/strong> Building organizational \u201cmuscle memory\u201d for responding to incidents is more important than ever. This includes clearly assigned roles and responsibilities, familiarity with external advisors, and appropriate insurance coverage. Table\u2011top exercises remain an important tool in developing these capabilities.<\/li>\n\n\n\n<li><strong>Data protection and segregation.<\/strong> Organizations should know where their most sensitive data resides, limit collection and retention to what is necessary, segregate critical data sets, and implement strong access controls to reduce the impact of a potential breach.<\/li>\n\n\n\n<li><strong>Service providers<\/strong>. AI\u2011enabled attacks increasingly target vulnerabilities in vendors and other service providers. Organizations should assess third\u2011party safeguards and ensure contracts clearly address cybersecurity controls, breach notification obligations, and response expectations in light of these new risks.<\/li>\n\n\n\n<li><strong>Use of AI<\/strong>. Organizations should understand how AI tools are being used internally. Clear governance, policies, and controls are needed to prevent unintended data exposure and the creation of new cybersecurity or privacy risks.<\/li>\n<\/ul>\n\n\n\n<p>If you have any questions or would like to discuss data protection and cybersecurity strategies in more detail, please reach out to our Canadian <a href=\"https:\/\/www.millerthomson.com\/en\/expertise\/technology-ip-and-privacy\/privacy-and-cybersecurity\/\">Privacy &amp; Cybersecurity<\/a> lawyers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The recent launch of Project Glasswing on April 7, 2026 signals a broader shift in the cybersecurity landscape as AI is rapidly increasing both the speed and sophistication of cyber threats. Specifically, Project Glasswing was initiated to provide a specified group of organizations with pre\u2011launch access to Anthropic\u2019s Mythos tool to help secure critical software [&hellip;]<\/p>\n","protected":false},"author":122,"featured_media":30996,"parent":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[557],"insight-format":[416],"class_list":["post-49608","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology-ip-and-privacy"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Data protection in the age of AI: Breach management strategies for organizations | Miller Thomson<\/title>\n<meta name=\"description\" content=\"A new AI tool can find software vulnerabilities and exploit them before a patch even exists. Is your organization prepared for threats that move faster than your security team? Discover the key steps Canadian organizations should take now to protect their data, their operations and their reputation.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-protection-in-the-age-of-ai-breach-management-strategies-for-organizations\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data protection in the age of AI: Breach management strategies for organizations | Miller Thomson\" \/>\n<meta property=\"og:description\" content=\"A new AI tool can find software vulnerabilities and exploit them before a patch even exists. Is your organization prepared for threats that move faster than your security team? Discover the key steps Canadian organizations should take now to protect their data, their operations and their reputation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-protection-in-the-age-of-ai-breach-management-strategies-for-organizations\/\" \/>\n<meta property=\"og:site_name\" content=\"Miller Thomson\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/MillerThomsonLaw\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-24T20:52:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-24T20:52:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2025\/04\/insights_technology_mobile.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1098\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sebastian Vives\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@millerthomson\" \/>\n<meta name=\"twitter:site\" content=\"@millerthomson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sebastian Vives\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-protection-in-the-age-of-ai-breach-management-strategies-for-organizations\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-protection-in-the-age-of-ai-breach-management-strategies-for-organizations\/\"},\"author\":{\"name\":\"Sebastian Vives\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/be05481ca4ee617c24b33993ade4c881\"},\"headline\":\"Data protection in the age of AI: Breach management strategies for organizations\",\"datePublished\":\"2026-04-24T20:52:28+00:00\",\"dateModified\":\"2026-04-24T20:52:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-protection-in-the-age-of-ai-breach-management-strategies-for-organizations\/\"},\"wordCount\":798,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-protection-in-the-age-of-ai-breach-management-strategies-for-organizations\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2025\/04\/insights_technology_mobile.jpg\",\"articleSection\":[\"Technology, IP and Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-protection-in-the-age-of-ai-breach-management-strategies-for-organizations\/#respond\"]}]},{\"@type\":[\"WebPage\",\"ItemPage\"],\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-protection-in-the-age-of-ai-breach-management-strategies-for-organizations\/\",\"url\":\"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-protection-in-the-age-of-ai-breach-management-strategies-for-organizations\/\",\"name\":\"Data protection in the age of AI: Breach management strategies for organizations | Miller Thomson\",\"isPartOf\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-protection-in-the-age-of-ai-breach-management-strategies-for-organizations\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-protection-in-the-age-of-ai-breach-management-strategies-for-organizations\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2025\/04\/insights_technology_mobile.jpg\",\"datePublished\":\"2026-04-24T20:52:28+00:00\",\"dateModified\":\"2026-04-24T20:52:31+00:00\",\"description\":\"A new AI tool can find software vulnerabilities and exploit them before a patch even exists. Is your organization prepared for threats that move faster than your security team? Discover the key steps Canadian organizations should take now to protect their data, their operations and their reputation.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-protection-in-the-age-of-ai-breach-management-strategies-for-organizations\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-protection-in-the-age-of-ai-breach-management-strategies-for-organizations\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-protection-in-the-age-of-ai-breach-management-strategies-for-organizations\/#primaryimage\",\"url\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2025\/04\/insights_technology_mobile.jpg\",\"contentUrl\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2025\/04\/insights_technology_mobile.jpg\",\"width\":1920,\"height\":1098,\"caption\":\"woman scrolling through social media on a smart phone holding a mug of coffee\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-protection-in-the-age-of-ai-breach-management-strategies-for-organizations\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.millerthomson.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data protection in the age of AI: Breach management strategies for organizations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#website\",\"url\":\"https:\/\/www.millerthomson.com\/en\/\",\"name\":\"Miller Thomson\",\"description\":\"National law firm providing business law expertise and litigation and disputes services for businesses across Canada since 1957.\",\"publisher\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.millerthomson.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#organization\",\"name\":\"Miller Thomson\",\"url\":\"https:\/\/www.millerthomson.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/miller-thomson.svg\",\"contentUrl\":\"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/miller-thomson.svg\",\"width\":380,\"height\":50,\"caption\":\"Miller Thomson\"},\"image\":{\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/MillerThomsonLaw\/\",\"https:\/\/x.com\/millerthomson\",\"https:\/\/www.linkedin.com\/company\/miller-thomson-llp\/\",\"https:\/\/www.youtube.com\/@millerthomson\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/be05481ca4ee617c24b33993ade4c881\",\"name\":\"Sebastian Vives\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9c50194d3d05da0f277cc6ce0c163d04a4150aed35e0d008c0cba4866c37cc31?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9c50194d3d05da0f277cc6ce0c163d04a4150aed35e0d008c0cba4866c37cc31?s=96&d=mm&r=g\",\"caption\":\"Sebastian Vives\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data protection in the age of AI: Breach management strategies for organizations | Miller Thomson","description":"A new AI tool can find software vulnerabilities and exploit them before a patch even exists. Is your organization prepared for threats that move faster than your security team? Discover the key steps Canadian organizations should take now to protect their data, their operations and their reputation.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-protection-in-the-age-of-ai-breach-management-strategies-for-organizations\/","og_locale":"en_US","og_type":"article","og_title":"Data protection in the age of AI: Breach management strategies for organizations | Miller Thomson","og_description":"A new AI tool can find software vulnerabilities and exploit them before a patch even exists. Is your organization prepared for threats that move faster than your security team? Discover the key steps Canadian organizations should take now to protect their data, their operations and their reputation.","og_url":"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-protection-in-the-age-of-ai-breach-management-strategies-for-organizations\/","og_site_name":"Miller Thomson","article_publisher":"https:\/\/www.facebook.com\/MillerThomsonLaw\/","article_published_time":"2026-04-24T20:52:28+00:00","article_modified_time":"2026-04-24T20:52:31+00:00","og_image":[{"width":1920,"height":1098,"url":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2025\/04\/insights_technology_mobile.jpg","type":"image\/jpeg"}],"author":"Sebastian Vives","twitter_card":"summary_large_image","twitter_creator":"@millerthomson","twitter_site":"@millerthomson","twitter_misc":{"Written by":"Sebastian Vives","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-protection-in-the-age-of-ai-breach-management-strategies-for-organizations\/#article","isPartOf":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-protection-in-the-age-of-ai-breach-management-strategies-for-organizations\/"},"author":{"name":"Sebastian Vives","@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/be05481ca4ee617c24b33993ade4c881"},"headline":"Data protection in the age of AI: Breach management strategies for organizations","datePublished":"2026-04-24T20:52:28+00:00","dateModified":"2026-04-24T20:52:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-protection-in-the-age-of-ai-breach-management-strategies-for-organizations\/"},"wordCount":798,"commentCount":0,"publisher":{"@id":"https:\/\/www.millerthomson.com\/en\/#organization"},"image":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-protection-in-the-age-of-ai-breach-management-strategies-for-organizations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2025\/04\/insights_technology_mobile.jpg","articleSection":["Technology, IP and Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-protection-in-the-age-of-ai-breach-management-strategies-for-organizations\/#respond"]}]},{"@type":["WebPage","ItemPage"],"@id":"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-protection-in-the-age-of-ai-breach-management-strategies-for-organizations\/","url":"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-protection-in-the-age-of-ai-breach-management-strategies-for-organizations\/","name":"Data protection in the age of AI: Breach management strategies for organizations | Miller Thomson","isPartOf":{"@id":"https:\/\/www.millerthomson.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-protection-in-the-age-of-ai-breach-management-strategies-for-organizations\/#primaryimage"},"image":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-protection-in-the-age-of-ai-breach-management-strategies-for-organizations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2025\/04\/insights_technology_mobile.jpg","datePublished":"2026-04-24T20:52:28+00:00","dateModified":"2026-04-24T20:52:31+00:00","description":"A new AI tool can find software vulnerabilities and exploit them before a patch even exists. Is your organization prepared for threats that move faster than your security team? Discover the key steps Canadian organizations should take now to protect their data, their operations and their reputation.","breadcrumb":{"@id":"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-protection-in-the-age-of-ai-breach-management-strategies-for-organizations\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-protection-in-the-age-of-ai-breach-management-strategies-for-organizations\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-protection-in-the-age-of-ai-breach-management-strategies-for-organizations\/#primaryimage","url":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2025\/04\/insights_technology_mobile.jpg","contentUrl":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2025\/04\/insights_technology_mobile.jpg","width":1920,"height":1098,"caption":"woman scrolling through social media on a smart phone holding a mug of coffee"},{"@type":"BreadcrumbList","@id":"https:\/\/www.millerthomson.com\/en\/insights\/technology-ip-and-privacy\/data-protection-in-the-age-of-ai-breach-management-strategies-for-organizations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.millerthomson.com\/en\/"},{"@type":"ListItem","position":2,"name":"Data protection in the age of AI: Breach management strategies for organizations"}]},{"@type":"WebSite","@id":"https:\/\/www.millerthomson.com\/en\/#website","url":"https:\/\/www.millerthomson.com\/en\/","name":"Miller Thomson","description":"National law firm providing business law expertise and litigation and disputes services for businesses across Canada since 1957.","publisher":{"@id":"https:\/\/www.millerthomson.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.millerthomson.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.millerthomson.com\/en\/#organization","name":"Miller Thomson","url":"https:\/\/www.millerthomson.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/miller-thomson.svg","contentUrl":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/10\/miller-thomson.svg","width":380,"height":50,"caption":"Miller Thomson"},"image":{"@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/MillerThomsonLaw\/","https:\/\/x.com\/millerthomson","https:\/\/www.linkedin.com\/company\/miller-thomson-llp\/","https:\/\/www.youtube.com\/@millerthomson"]},{"@type":"Person","@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/be05481ca4ee617c24b33993ade4c881","name":"Sebastian Vives","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.millerthomson.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9c50194d3d05da0f277cc6ce0c163d04a4150aed35e0d008c0cba4866c37cc31?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9c50194d3d05da0f277cc6ce0c163d04a4150aed35e0d008c0cba4866c37cc31?s=96&d=mm&r=g","caption":"Sebastian Vives"}}]}},"_links":{"self":[{"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/posts\/49608","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/users\/122"}],"replies":[{"embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/comments?post=49608"}],"version-history":[{"count":1,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/posts\/49608\/revisions"}],"predecessor-version":[{"id":49609,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/posts\/49608\/revisions\/49609"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/media\/30996"}],"wp:attachment":[{"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/media?parent=49608"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/categories?post=49608"},{"taxonomy":"insight-format","embeddable":true,"href":"https:\/\/www.millerthomson.com\/en\/wp-json\/wp\/v2\/insight-format?post=49608"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}