Tailor the notification process to the audience ??? high-value customers, senior employees, or individuals who might be particularly vulnerable (such as the elderly, the disabled, and minors) and to the nature of the breach; Handle the theft of confidential client information differently than the stealing of employees??? Social Security numbers.