The Data Breach Checklist: What to Do Before and After It Happens