<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; kbarney</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/author/kbarney/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>Protecting high-risk information in EHRs</title>
		<link>http://www.experian.com/blogs/data-breach/2012/07/03/protecting-high-risk-information-in-ehrs/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/07/03/protecting-high-risk-information-in-ehrs/#comments</comments>
		<pubDate>Tue, 03 Jul 2012 17:34:58 +0000</pubDate>
		<dc:creator>kbarney</dc:creator>
				<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[Medical Data Breach]]></category>
		<category><![CDATA[PHI]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1410</guid>
		<description><![CDATA[Our guest blogger this week is Karen Barney of the Identity Theft Resource Center (ITRC). According to one recent study[i], more than 19 million health records have been compromised since August 2009.  As the health care industry moves into the adoption of electronic health records (EHRs), medical breaches have become a more significant concern. These [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F07%2F03%2Fprotecting-high-risk-information-in-ehrs%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach,Data+Security,HIPAA,Medical+Data+Breach,PHI&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<div>
<div>
<p><em><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/07/medical-records.jpg"><img class="aligncenter size-full wp-image-1415" title="medical-records" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/07/medical-records.jpg" alt="" width="440" height="298" /></a></em></p>
<p><em>Our guest blogger this week is Karen Barney of the Identity Theft Resource Center (ITRC).</em></p>
<p>According to one recent study<a href="http://www.experian.com/blogs/data-breach/wp-admin/post-new.php#_edn1" class="broken_link" rel="nofollow">[i]</a>, more than 19 million health records have been compromised since August 2009.  As the health care industry moves into the adoption of electronic health records (EHRs), medical breaches have become a more significant concern. These studies strive to establish a business case for health organizations to create strengthened compliance programs that will enhance PHI security and privacy.  The programs focus primarily on the financial risk that health organizations face – through examination of elements that pose a threat. For example, these risks can manifest themselves through the number of varied health care organization handling PHI, and human threats which may come from malicious insiders, outsiders, or even cyber-crime rings.  In addition, these may include the dissemination of data through<a title="Medical and mobile: Convenience trumps security" href="http://www.experian.com/blogs/data-breach/2012/05/02/medical-and-mobile-convenience-trumps-security/"> wireless devices or mobile devices</a>. There are other methods which may include lost or stolen information. </p>
<p>PHI is valuable to identity thieves because it is considered to provide a lucrative outlet in the area of<a title="Annual Study on Medical ID Theft" href="http://www.experian.com/innovation/business-resources/ponemon-third-annual-medical-id-theft-study.jsp"> Medical Identity Theft</a>.  The rewards to this crime have surged as it is commonly tied to Financial Identity Theft.  The released studies highlight the necessity for those organizations in the health care industry to assess the threat, consequences, and vulnerability to PHI.  The proposed areas to be considered include procedures, policy, and the technology threat to the security of PHI.  With that said, privacy and security should be viewed as a priority by health care organizations. In order to determine the impact, these organizations need to analyze the relevance of the problem, and analyze the impact of the consequences that arise.  In doing so, health care organization will need ample and strong support for security, safeguards and controls, accessibility to resources, accountability both from leadership executives and below, strong authentication practices, and knowledge of the PHI flow within the organization and related.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff">Webinar Download: Healthcare Information Security Today conducted a survey to provide an in-dpeth assessment of the effectiveness of data protection efforts. <a title="Healthcare Info Security Webinar" href="http://www.experian.com/innovation/business-resources/cyber-insurance-data-breach-response-plan.jsp?WT.srch=ecd_dbres_blog_070312_article  ">View Now! </a></div></div>
<p>In the health care community, privacy is a fundamental right protected not only by laws, such as the Health Insurance Portability and Accountability Act of 1996 (HIPAA), but is also a right expected by the patient.  As the health industry adopts the use of electronic files, the number of organizations handling Protected Health Information (PHI) increases.  An understanding of the risks, and the impacts – financial or not, can help organizations that handle PHI strengthen their<a title="Webinar: The State of Healthcare Information Security Today" href="http://www.experian.com/innovation/business-resources/healthcare-info-sec-today-webinar.jsp"> prevention and detection efforts</a> in addition to reducing liability. The breach of PHI creates problems both for the organizations and the patients whose information is entrusted to be protected.</p>
<div>
<div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-admin/post-new.php#_ednref1" class="broken_link" rel="nofollow">[i]</a> Redspin study, Breach Report 2011/Protected Health Information</p>
</div>
</div>
<p>&nbsp;</p>
</div>
</div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/07/03/protecting-high-risk-information-in-ehrs/&via=Experian_DBR&text=Protecting high-risk information in EHRs&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F07%2F03%2Fprotecting-high-risk-information-in-ehrs%2F&amp;title=Protecting%20high-risk%20information%20in%20EHRs" id="wpa2a_2"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/07/03/protecting-high-risk-information-in-ehrs/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Password management</title>
		<link>http://www.experian.com/blogs/data-breach/2012/06/19/password-management/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/06/19/password-management/#comments</comments>
		<pubDate>Tue, 19 Jun 2012 17:21:47 +0000</pubDate>
		<dc:creator>kbarney</dc:creator>
				<category><![CDATA[Fraud Resolution]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[password security]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1354</guid>
		<description><![CDATA[Our guest blogger this week is Karen Barney of the Identity Theft Resource Center (ITRC). The rise of online functionality and connectivity has in turn given rise to online security issues, which create the need for passwords and other defenses against information theft.  Most people today have multiple online accounts and accompanying passwords to protect [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F06%2F19%2Fpassword-management%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,cyber+crime,Cyber+Security,password+security&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/06/Password-Management.jpg"><img class="aligncenter size-full wp-image-1357" title="Password Management" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/06/Password-Management.jpg" alt="" width="461" height="461" /></a></p>
<p><em>Our guest blogger this week is Karen Barney of the Identity Theft Resource Center (ITRC).</em></p>
<p><em>The</em> rise of online functionality and connectivity has in turn given rise to online security issues, which create the need for passwords and other defenses against information theft.  Most people today have multiple online accounts and accompanying passwords to protect those accounts.  I personally have accounts (and passwords) for sites I no longer even remember.  And while I have more accounts than most due to my profession, my hunch is that many people deal with the issue of password overload.  Password overload is when you attempt to use your Pinterest, Twitter, work email and university login passwords (one after another) to get into your Money Market Account only to be locked out.  Now you have to go into the branch with photo ID, or endure the dreaded “customer service hotline” (not-line) to prove that “you are you.”  I expect that you have experienced such “password overload” inconveniences, or you almost certainly know someone who has.</p>
<p>The problem seems like it could be easily solved by using the same password for everything.  One password to remember, and no more jumbling through your notebook trying to find what password you used for your newest account creation or Facebook app.  The problem with this approach is that if you are using the same <a title="passwords-that-wont-crack" href="http://blog.protectmyid.com/2012/05/30/passwords-that-wont-crack-under-pressure/" class="broken_link" rel="nofollow">passwords</a> for all (or even several) of your accounts, then if someone manages to get the password for say, your Instagram account, they would probably be able to then drain your savings account, phish your family for personal information (such as your Social Security Number), or rack up a warrant in your name for writing bad checks….  This could all happen because you logged into Facebook at an unsecured Wi-fi location, where your password for that one <a title="state-of-identity-theft" href="http://www.experian.com/blogs/data-breach/2012/06/11/infographic-the-state-of-identity-theft/">account is compromised</a>, and it happens to be the same password you use for multiple accounts.</p>
<p>So, what do you do if you don’t want to tattoo 25 passwords on your arm and you don’t want to end up cuffed for felony check fraud? The answer is a password manager.  This new service was created so that users can remember just one password, yet have access to all other passwords. The best part is that you can have access to these passwords from anywhere as most of the new password managers are internet based. As the need for password management increases, the options consumers have grown leaving even the strictest cybersecurity aficionado pleased with the service. </p>
<p>A few things you should look for when finding a password manager are:</p>
<ol>
<li>Is it cross platform? Will it work on your iPhone and your PC?</li>
<li>How is the information (your passwords) encrypted?</li>
<li>Does the service sync automatically, or will the user need to update the password storage database every time they sign up for a new account?</li>
<li>What is the initial authentication process and how strong is it?</li>
<li>How reputable is the company who created the product and what is reported about the product itself?</li>
</ol>
<p>By asking yourself these questions you should be on your way to making sure that your passwords are protected and you won’t lose your mind trying to keep track of them all. Just make sure you protect your login credentials for your password manager…. like <strong>really, really well</strong>&#8230;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/06/19/password-management/&via=Experian_DBR&text=Password management&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F06%2F19%2Fpassword-management%2F&amp;title=Password%20management" id="wpa2a_4"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/06/19/password-management/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The data breach reporting landscape &#8211; part 1</title>
		<link>http://www.experian.com/blogs/data-breach/2012/02/28/the-data-breach-reporting-landscape-part-1/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/02/28/the-data-breach-reporting-landscape-part-1/#comments</comments>
		<pubDate>Tue, 28 Feb 2012 16:25:22 +0000</pubDate>
		<dc:creator>kbarney</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Security Breaches]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1010</guid>
		<description><![CDATA[Our guest blogger this week is Karen Barney of the Identity Theft Resource Center (ITRC). As an organization specializing in monitoring and tracking data breaches, the ITRC has come across varying degrees of breaches and reasons for notification due to the varying types of compromised information. We would like to take this opportunity to address [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F02%2F28%2Fthe-data-breach-reporting-landscape-part-1%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach,Data+Breach+Notification,Data+Security,hackers,Security+Breaches&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/02/crumbling-lock.jpg"><img class="aligncenter size-full wp-image-1014" title="crumbling lock" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/02/crumbling-lock.jpg" alt="" width="509" height="338" /></a></p>
<p><em>Our guest blogger this week is Karen Barney of the Identity Theft Resource Center (ITRC).</em></p>
<p>As an organization specializing in monitoring and tracking data breaches, the <a title="itrc website" href="http://www.idtheftcenter.org/" class="broken_link" rel="nofollow">ITRC</a> has come across varying degrees of breaches and reasons for notification due to the varying types of compromised information. We would like to take this opportunity to address some of the differences and provide some insight into our approach for tracking data breach incidents.</p>
<p>According to most state laws, a data breach is an <em>incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so</em>. Data breaches may involve personal health information (PHI), personally identifiable information (PII), trade secrets or intellectual property.  Note that under these state breach laws, non-personal identifying information is <em>not</em> included.</p>
<p>Next, let’s consider hacking.  By definition, &#8220;hacking&#8221; is the deliberate and unauthorized access, use, disclosure, and/or taking of electronic data on a computer.  Hacking efforts target all types of information – from high level intellectual property down to individual personal information, both sensitive and non-sensitive information.  Taken together, these two situations result in nearly 26% of the “reported breaches” included on the 2011 Identity Theft Resource Center Breach List.</p>
<p>This brings us to the definition of “reported breaches”.  ITRC only publishes breach incident information which is available from credible, public resources.  Breach incidents are tracked daily from sources such as state Attorneys General offices, a variety of media sources, and other well-recognized and respected entities that track and capture this information from publicly available sources.  This approach means that the ITRC Breach Report only reflects the tip of the iceberg.</p>
<p>In 2011, 41% of the <a title="2011 Year of the Breach" href="http://www.experian.com/blogs/data-breach/2011/12/20/year-of-the-breach-2011-in-review/">breaches</a> on the ITRC report show the number of records exposed as “unknown.”  In addition, ITRC is aware of a significant number of breaches that are not made public.  As a result, it is not possible to provide truly accurate numbers – either for the number of breaches or the number of records.</p>
<p>The majority of “reported breaches” included in the list are those which have met “breach notification triggers” established by the various state laws regarding this issue.  Usually these incidents are electronic in nature, and must also expose information identified as PII, such as first and last name combined with a social security number, driver’s license or state identification number and/or financial account numbers (including debit and credit cards).   Some states have expanded this “trigger” definition to include medical and healthcare information.  This situation leaves large loopholes for breaches to remain unreported.</p>
<p>Currently we know that –</p>
<ul>
<li>An indeterminable number of breaches go unreported, even when <a title="Breach notification in three easy steps" href="http://www.experian.com/blogs/data-breach/2011/05/10/breach-notification-in-three-easy-steps/">notification</a> should have been triggered according to the applicable state laws.</li>
<li>Many breach notifications (at least what is disclosed by the entity) underreport the number of records</li>
<li>Many breach notifications also do not clearly define the types of information exposed.</li>
<li>Public information is often incomplete in detailing how the breach occurred</li>
<li>Many breaches involving non-PII, such as email addresses, user names, and passwords, are not reported because they do not meet “breach notification triggers” as established by various state laws</li>
</ul>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/02/28/the-data-breach-reporting-landscape-part-1/&via=Experian_DBR&text=The data breach reporting landscape - part 1&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F02%2F28%2Fthe-data-breach-reporting-landscape-part-1%2F&amp;title=The%20data%20breach%20reporting%20landscape%20%E2%80%93%20part%201" id="wpa2a_6"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/02/28/the-data-breach-reporting-landscape-part-1/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Year of the breach: 2011 in review</title>
		<link>http://www.experian.com/blogs/data-breach/2011/12/20/year-of-the-breach-2011-in-review/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/12/20/year-of-the-breach-2011-in-review/#comments</comments>
		<pubDate>Tue, 20 Dec 2011 23:24:20 +0000</pubDate>
		<dc:creator>kbarney</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Identity Theft Resource Center]]></category>
		<category><![CDATA[PHI]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[privacy legislation]]></category>
		<category><![CDATA[Security Breaches]]></category>
		<category><![CDATA[smishing]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=888</guid>
		<description><![CDATA[Several high profile events throughout the year have kept the spotlight on the issue of data exposures, especially those where millions of consumers information was obtained by malicious hackers.  Although the information involved, emails and passwords, does not rise to the level of a “personal identifying information” (PII) breach, it is definitely troubling that such a large number of consumers may become targets of phishing and related attacks, which do attempt to get consumers PII.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F12%2F20%2Fyear-of-the-breach-2011-in-review%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Data+Breach,Data+Security,Identity+Theft+Resource+Center,PHI,Phishing,PII,privacy+legislation,Security+Breaches,smishing&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/usb_data_breach_laptop_610.jpg"><img class="aligncenter size-full wp-image-891" title="usb_data_breach_laptop_610" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/usb_data_breach_laptop_610.jpg" alt="Business person inserting usb into laptop" width="610" height="407" /></a></p>
<p><em>Our guest blogger this week is Karen Barney of the <a title="Identity Theft Resource Center" href="http://www.idtheftcenter.org/" target="_blank" class="broken_link" rel="nofollow">Identity Theft Resource Center</a> (ITRC).</em></p>
<p>The number of breaches reported so far in 2011 is down from 2010, yet 2011 is still considered by many to be yet another “Year of the Breach”.    Several high profile events throughout the year have kept the spotlight on the issue of data exposures, especially those where millions of <a href="http://www.shutterfly.com/home/myshutterfly.sfly" class="broken_link" rel="nofollow">consumers information</a> was obtained by malicious hackers.  Although the information involved, emails and passwords, does not rise to the level of a “personal identifying information” (PII) breach, it is definitely troubling that such a large number of consumers may become targets of phishing and related attacks, which do attempt to get consumers PII.</p>
<p>More and more entities are now tracking data breach occurrences by:</p>
<ul>
<li>Industry sectors (categories): Business,      educational, government, medical, financial</li>
<li>Breach “type” (method of access): hacking,      insider, portable device (“data on the move”), accidental exposure,      subcontractor, and lost or stolen.       In some cases, discarded paper documents.</li>
<li>various attributes: paper or electronic, encrypted,      password-protected, number of records unknown or published</li>
</ul>
<p>While most definitions and terms are relatively consistent between these monitoring sources, there are some notable differences.  Differing filters applied by each monitoring entity as to what qualifies as a data breach on any given list create some divergence in comparison of breach lists.  These filters may range from whether the incident involves specific types of exposed PII to whether a designated minimum number of records have been compromised (i.e. 10 or 500 minimum).</p>
<p>Often it is how a “record” is defined that yields the greatest disparity in determining the number of “records” exposed.  Many breach analysts consider “records” to those persons whose sensitive <a href="../2011/09/27/ensuring-the-security-of-personal-identifiable-information/">personal identifying information</a> (PII), such as Social Security numbers, debit or credit card numbers, financial account numbers, medical record numbers, and driver’s license or state identification numbers have been exposed.  How then, does one then account for compromised non-PII information, such as email addresses, user names, or other non-financial account information?</p>
<p>Many <a href="../2011/09/06/how-hackers-find-their-targets/">hacking incidents</a> this past year didn’t target personal identifying information, but instead focused on emails addresses, passwords and other pieces of non-sensitive personal information.   The challenge for many who analyze breach incident statistics is how to “quantify” the number of breached records that do not involve PII.  Should emails and passwords be counted as “records” in the same way as Social Security numbers and financial account numbers?   As of now, most state laws do not include non-sensitive personal information as triggers for breach notification therefore there is no obligation to report the incident.</p>
<p>&#8220;The law only requires that an entity notify those who had sensitive information compromised, like Social Security numbers,&#8221; says Lisa Sotto, a managing partner for New York-based law firm Hunton &amp; Williams, in a recent interview with BankInfoSecurity.   &#8220;But now we know other things, like e-mail addresses, can lead to compromise through social engineering and phishing.</p>
<p>The challenge then for the incidence response team is determining if a breach notification is required.  If so, “what happened?”, “who needs to be notified”, “what specifics are required?”, “when do we do it?”, “how did it happen?”, and “what have we done to make sure it won’t happen again?”  The answers to these questions should all be part of an established Breach Response Plan.  Other pieces of this plan should include best practice protocols, procedures, corporate training guidelines and employee education.  In addition, an organizational ethic must be created so that all employees realize the importance of protecting personal information.  A corporate environment must be maintained which fosters and strengthens information security awareness at all levels of the organization.</p>
<p>Another important issue to consider in your company’s <a href="http://www.shutterfly.com/home/myshutterfly.sfly" class="broken_link" rel="nofollow">incident response plan</a> is whether it is in the best interest of the company to report a data breach incident when there is no legal obligation to do so.  Under these circumstances, it is critical that the response team identify the best notification and crisis management tactics before a breach ever occurs.   Those companies with strong incident response plans are able to react more quickly and accurately, prevent further data loss (and potential fines), and present factual reporting to the public that minimizes customer backlash and negative publicity.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/12/20/year-of-the-breach-2011-in-review/&via=Experian_DBR&text=Year of the breach: 2011 in review&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/12/20/year-of-the-breach-2011-in-review/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>What consumers should know about data breach notification</title>
		<link>http://www.experian.com/blogs/data-breach/2011/11/02/what-consumers-should-know-about-data-breach-notification/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/11/02/what-consumers-should-know-about-data-breach-notification/#comments</comments>
		<pubDate>Wed, 02 Nov 2011 16:36:27 +0000</pubDate>
		<dc:creator>kbarney</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Consumer fraud]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Identity Theft Resource Center]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=854</guid>
		<description><![CDATA[It can be unnerving to be told that your information has been compromised in a data breach.  The uncertainty of not knowing all the details and the anxiety over what information has been exposed is deeply troubling to many consumers.  A breach notice makes us aware of a new risk to our lives that we can’t measure easily.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F11%2F02%2Fwhat-consumers-should-know-about-data-breach-notification%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Consumer+fraud,Data+Breach,Data+Breach+Notification,data+breach+response,Fraud,Identity+Theft,Identity+Theft+Resource+Center&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/11/lettermailbox.jpg"><img class="aligncenter size-full wp-image-856" title="lettermailbox" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/11/lettermailbox.jpg" alt="Notification Letter Mailbox" width="448" height="336" /></a></p>
<p><em>Our guest blogger this week is Karen Barney of the <a title="Identity Theft Resource Center" href="http://www.idtheftcenter.org" target="_blank" class="broken_link" rel="nofollow">Identity Theft Resource Center</a> (ITRC).</em></p>
<p>It can be unnerving to be told that your information has been compromised in a data breach.  The uncertainty of not knowing all the details and the anxiety over what information has been exposed is deeply troubling to many consumers.  A breach notice makes us aware of a new risk to our lives that we can’t measure easily.</p>
<p>Often times, there is a lot of speculation surrounding the company’s timing of the <a href="../2011/09/20/over-reporting-vs-under-reporting-data-breaches/">breach notification</a>.  The timing of notification may depend upon a variety of state laws, some of which may delay notification if law enforcement is doing an investigation of the incident and has requested a delay to make the investigation easier.  In most breach cases, the company will want to investigate internally prior to making public notice.  It is important to the consumer and the company that they provide a notice which is accurate.  No one is happy when a notice is made public, and then has to be changed as further information comes to light.  Everyone is better served when the company gets the information right the first time.</p>
<p>It is also important to understand the complexities which may surround various types of data breaches. Not all breaches are equal in the amount of risk posed to the consumer.  For instance, some pieces of information about you are generally available and public, and pose little risk to you taken alone, such as your email address, or first and last name.  Credit card numbers that are exposed are a risk, but not a long term problem, as the issuer will provide a new card with a different account number very quickly.</p>
<p>Additionally, malicious attacks on a company’s server, insider (employee) theft, or the theft of mobile devices (i.e. storage devices, laptops) may be more likely to lead to identity theft than accidental posting on a long-ago cached website or papers left behind in an old abandoned building.  Knowing whether or not the breach incident was malicious or accidental in nature may help you to put the level of risk into a better perspective.</p>
<p>Just remember, unless you know otherwise, the fact that your data was compromised does NOT mean you are an <a href="http://www.protectmyid.com/" class="broken_link" rel="nofollow">identity theft</a> victim.  In fact, there have been millions of people notified that their information may have been breached who have not become identity theft victims. Your <a href="../../../data-breach/data-breach-resources.html">response</a> to the breach will depend on the type of information that was compromised.  Here are some steps you can take at this time:</p>
<p><strong>Financial Account Numbers: </strong></p>
<p>This includes checking accounts, credit cards, money market funds, stocks, and bank accounts:</p>
<ul>
<li>Close      ONLY the affected accounts and have account numbers changed.</li>
<li><a href="../2011/08/23/do-your-passwords-pass-the-hack-test/">Password</a>-protect      <strong>all </strong>your accounts, the new ones      as well as the closed.  This restricts      thieves from re-opening closed accounts.</li>
<li>Monitor      your account and billing statements closely</li>
<li>Report      any fraudulent activity immediately to the bank and law enforcement.</li>
</ul>
<p><strong>Social Security Numbers:<br />
</strong>Call the credit reporting agencies.  These are automated and secure systems.   Place a fraud alert with each agency and request a free copy of each of your credit reports.  It is free because your information was breached and you are a potential victim of identity theft.  Do this for any person whose Social Security Number (SSN) was compromised. If the SSN belongs to a child, you should find that there is <strong>no credit report </strong>available for that <a href="http://www.familysecure.com/default.aspx?sc=668285" class="broken_link" rel="nofollow">child</a>.  If there is a credit report for a child, it indicates that the child’s information may have been used. In that case, you need to get a copy of the credit report in order to repair the incorrect items.</p>
<p>It is also recommended that you call all three credit reporting agencies and not just one.  Check your report carefully for any irregularities.  Sometimes people see errors on the report that were on the report before the data breach occurred.</p>
<p>You can use, without charge, the annual credit reports system <a href="http://www.annualcreditreport.com/" class="broken_link" rel="nofollow">www.annualcreditreport.com</a> to monitor your credit report over the next year. Stagger them throughout the year by ordering one every four months.</p>
<p>Or, if you want real-time updates on your credit report, you may want to consider a paid service which monitors your credit report and alerts you immediately upon any change.</p>
<p><strong> </strong></p>
<p><strong>Other:</strong></p>
<ul>
<li>If your auto or medical insurance policy information is      involved, ask the company about their policy to protect compromised      policies.</li>
<li>If it is HR data that was compromised, change account numbers      for your 401-K, life insurance, and accounts holding your stock options.  Password-protect these accounts.</li>
<li>Driver’s License’s &#8211; contact your state Department/Bureau of      Motor Vehicles and notify them of the theft.  They most likely will not change your      number.</li>
</ul>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/11/02/what-consumers-should-know-about-data-breach-notification/&via=Experian_DBR&text=What consumers should know about data breach notification&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/11/02/what-consumers-should-know-about-data-breach-notification/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Ensuring the security of personal identifiable information</title>
		<link>http://www.experian.com/blogs/data-breach/2011/09/27/ensuring-the-security-of-personal-identifiable-information/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/09/27/ensuring-the-security-of-personal-identifiable-information/#comments</comments>
		<pubDate>Tue, 27 Sep 2011 17:33:12 +0000</pubDate>
		<dc:creator>kbarney</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Identity Theft Resource Center]]></category>
		<category><![CDATA[PII]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=794</guid>
		<description><![CDATA[Everywhere you turn these days there’s word of a new data breach.  In the course of our lifetime, our “personal identifying information (PII)” is shared with hundreds of companies, governmental agencies, educational facilities, businesses and health care providers.  What can a consumer do to protect their sensitive personal information?]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F09%2F27%2Fensuring-the-security-of-personal-identifiable-information%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach,Identity+Theft+Resource+Center,PII&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/09/security2.jpg"><img class="aligncenter size-full wp-image-796" title="C" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/09/security2.jpg" alt="" width="448" height="336" /></a></p>
<p>Everywhere you turn these days there’s word of a new data breach.  Your old college – archives hacked.  Your dentist’s office – files stolen.  The local retailer – credit cards skimmed.  Government offices – accidental posting of information online.</p>
<p>In the course of our lifetime, our “personal identifying information (PII)” is shared with hundreds of companies, governmental agencies, educational facilities, businesses and healthcare providers.  Social Security Numbers, account numbers, birthdates, and other identifiers are diffused into thousands of databases, each with its own risk of exposing our PII.</p>
<p>These are all areas that the ITRC recognizes as areas “beyond your personal control”.  While you make every effort to protect your personal identifying information, the same cannot always be said for those who hold it in their possession.</p>
<p>Data breaches (the inadvertent or malicious exposure of our sensitive personal information) are a fact of modern life as evidenced by the many high profile data security breaches which have occurred throughout 2011.  Late in 2010 the ITRC predicted an increase in breaches aimed at email lists which would lead to more social networking scams and malware attacks.  This has indeed come to pass.</p>
<p>The harsh reality is that our personal information is simply available in too many places to ensure a high level of security over a long period of time.  So what can a consumer do to minimize their risk in these areas which are beyond our control?  Before you provide your personal information, ask the following questions:</p>
<ul>
<li>Why do you need my Social Security number? </li>
<li>What will happen if I don’t provide it?</li>
<li>Is there an alternative identifier you can use instead? </li>
<li>How is it going to be used?</li>
<li>Do you have published policies about data protection?</li>
</ul>
<p>Depending on the answers, you may have a decision to make.  You can decide to continue with that company, or find one that will provide acceptable answers.  It’s your data they will control.</p>
<p>Businesses have both an ethical and legal responsibility to <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">protect</a> personal identifying information and control access to such information.  Businesses should clearly identify their specific need to collect sensitive personal information and to ensure that those within a company, who access this information, have a recognized need for such access</p>
<p>Additionally, consumers need to make the case with businesses that data protection is a critical issue.  This point can be made by alerting businesses that access to an individual’s SSN should never be taken lightly.</p>
<p><a title="Experian's Turn-Key Data Breach Resolution" href="http://www.experian.com/data-breach/data-breach-security.html?WT.srch=ecd_dbres_blog_092711_article  "><div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff">Learn more about Experian&#8217;s Turn-Key Data Breach Resolution Support!</div></div></a></p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/09/27/ensuring-the-security-of-personal-identifiable-information/&via=Experian_DBR&text=Ensuring the security of personal identifiable information&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/09/27/ensuring-the-security-of-personal-identifiable-information/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>