7 breach notification processes that must be followed