Case Study · Data Privacy & Cybersecurity Law
Ransomware Breach: Legal Incident Response and Regulatory Navigation for a Healthcare Provider
Client Background & Context
The Situation When Our Client Came to Us
Our client — a multi-specialty hospital group operating across three cities in Telangana and Andhra Pradesh — suffered a ransomware attack on a Saturday afternoon that encrypted their patient management system, billing system, and clinical document repository. The attack was confirmed at 4:17 PM.
The hospital’s IT team immediately isolated the affected systems and contacted their IT vendor. By 6 PM, it was clear that over 2,000 patient records containing sensitive health data had been accessed and potentially exfiltrated before encryption. The attackers demanded a ransom equivalent to approximately ₹80 lakh in cryptocurrency.
At 7:30 PM — three hours and thirteen minutes after attack confirmation — the hospital’s administrator called SIRI Law LLP. By that time, the CERT-In 6-hour notification window was running.
The matter required simultaneous management of criminal investigation coordination, CERT-In regulatory notification, patient notification strategy, insurance notification, media management, and technical forensic investigation — all within the first 72 hours.
Key Challenges
What Made This Matter Complex
CERT-In 6-Hour Notification Window
With only 2 hours and 47 minutes remaining on the CERT-In notification clock when we were engaged, completing a technically accurate notification in time was the immediate critical challenge.
Ransom Payment Legal Risk
The client’s insurers raised the possibility of ransom payment. This required urgent legal analysis of PMLA implications, FEMA considerations for a crypto payment, and RBI guidance — all with incomplete information about the attackers.
Patient Notification Obligations
The DPDPA was not yet operationally in force, but the IT (Amendment) Rules and the hospital’s own privacy policy created notification obligations. Determining what to tell patients, when, and in what form required careful legal judgment.
Media & Reputational Risk
A healthcare provider’s handling of a patient data breach is inherently newsworthy. Managing the information carefully to prevent premature disclosure while meeting regulatory obligations required precise coordination.
Engagement Timeline
How We Handled It — Phase by Phase
Hour 1–3: Immediate Response
- Engaged within minutes of the client’s call — deployed a two-lawyer response team immediately
- Completed CERT-In notification within the 6-hour window — at 4 hours 52 minutes after attack confirmation
- Established attorney-client privilege framework for the forensic investigation — protecting findings
- Issued a legal hold notice to the hospital’s IT team preserving all logs and forensic artifacts
Days 1–3: Investigation & Strategy
- Coordinated digital forensics investigation under legal privilege — establishing exfiltration scope
- Advised against ransom payment based on legal risk analysis — insurer agreed with reasoned position
- Drafted patient notification communication — phased notification strategy approved
- Coordinated with cybercrime cell to file an FIR — preserving criminal remedies against attackers
Week 2–4: Regulatory Management
- Completed supplementary CERT-In incident report with forensic findings
- Sent first phase patient notifications to 2,000+ affected individuals
- Engaged with hospital’s cyber insurance provider — liability assessment and claim preparation
- Implemented legal counsel review of hospital’s security programme — identifying remediation priorities
Months 2–4: Closure
- Systems fully restored within 14 days of attack using clean backups
- No regulatory penalty proceedings initiated — CERT-In acknowledged responsive compliance
- Insurance claim settled — significant recovery against remediation and notification costs
- Long-term data protection and incident response programme implemented
SIRI Law LLP Expertise Applied
This matter drew on SIRI Law LLP’s cross-practice capabilities — combining deep subject matter expertise with procedural precision and strategic judgment.
Our Legal Approach
The Strategy That Delivered Results
The CERT-In 6-hour notification window is unforgiving — and the legal quality of the notification matters as much as its timeliness. A poorly drafted notification that underestimates the incident scope can create worse regulatory exposure than a late notification.
Our approach to the CERT-In notification was to be accurate, comprehensive, and to demonstrate institutional seriousness — providing the notification authority with confidence that the hospital was managing the incident competently, not attempting to minimise or conceal.
The ransom payment analysis was particularly important. PMLA implications of cryptocurrency payments to unknown parties — potentially sanctioned groups — create significant legal risk that insurers and boards do not always appreciate intuitively. Our legal opinion documenting the risk was critical in aligning the hospital’s board, IT team, and insurers on a no-payment decision.
Patient notification was handled through a phased approach — first contacting those whose data showed evidence of actual exfiltration, then those in the broader affected system — with plain-language communications reviewed by our team for both legal accuracy and compassionate tone.
Key Principles Applied
CERT-In Incident Response
DPDPA Breach Notification
Digital Forensics
Cyber Insurance
Ransomware Advisory
Criminal Complaint
Outcomes Achieved
What Our Client Achieved
CERT-In Notified Within Window
Notification filed within 6 hours of engagement — regulatory obligation met despite the compressed timeline.
No Regulatory Penalties
CERT-In and health regulatory authorities acknowledged the hospital’s responsive and transparent incident management — no enforcement action initiated.
Ransom Not Paid
Forensically informed and legally sound no-payment decision — avoiding PMLA risk, avoiding funding criminal actors, and ultimately recovering data through backups.
Insurance Recovery Achieved
Cyber insurance claim successfully submitted and settled — substantially offsetting remediation, notification, and legal response costs.
Systemic Security Improvement
Post-incident legal review led to board-approved investment in security programme improvements — converting the crisis into a governance catalyst.
Key Learnings & Implications
What This Matter Teaches Clients in Similar Situations
Healthcare organisations are among the highest-value ransomware targets globally — because patient data is extraordinarily sensitive and hospitals face pressure to restore operations quickly. This creates ransom payment pressure that must be resisted through advance preparation, not reactive crisis management.
The single most impactful pre-breach investment any organisation can make is having a tested incident response plan — including pre-engagement of legal counsel, pre-populated CERT-In notification templates, and a clear decision tree for ransom payment assessment.
Structuring the forensic investigation under legal privilege from the outset — by engaging forensic investigators through legal counsel — protects the findings from regulatory compulsion in most scenarios. This is one of the most underutilised protections in cyber incident response.
Have a Similar Matter?
We can advise you on your specific situation in a confidential consultation.
Contact Us →Facing a Similar Legal Challenge?
All consultations are confidential. Our team has the expertise to advise you on your specific matter.
Also see: View Data Privacy & Cybersecurity Law · Contact Us

