<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; lponemon</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/author/lponemon/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>Consequences following a data breach</title>
		<link>http://www.experian.com/blogs/data-breach/2012/01/25/consequences-following-a-data-breach/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/01/25/consequences-following-a-data-breach/#comments</comments>
		<pubDate>Wed, 25 Jan 2012 16:58:48 +0000</pubDate>
		<dc:creator>lponemon</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Fraud Resolution]]></category>
		<category><![CDATA[breach notification fatigue]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[healthcare data breach]]></category>
		<category><![CDATA[Ponemon Institute]]></category>
		<category><![CDATA[privacy legislation]]></category>
		<category><![CDATA[ProtectMyID]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=923</guid>
		<description><![CDATA[Our latest study, Aftermath of a Data Breach Study, was conducted to better understand how a data breach affects organizations over the long term.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F01%2F25%2Fconsequences-following-a-data-breach%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+notification+fatigue,Data+Breach+Notification,data+breach+response,healthcare+data+breach,Ponemon+Institute,privacy+legislation,ProtectMyID&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/01/security-1024x722.jpg"><img class="aligncenter size-full wp-image-938" title="security-1024x722" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/01/security-1024x722.jpg" alt="" width="553" height="390" /></a></p>
<p><em>Our guest blogger this week is Dr. Larry Ponemon, Chairman and Founder of the <a title="Ponemon Institute Website" href="http://www.ponemon.org/index.php" target="_blank" class="broken_link" rel="nofollow">Ponemon Institute</a>.</em></p>
<p>Our latest study, <a title="Ponemon Aftermath Study Landing Page" href="http://www.experian.com/PonemonAftermathStudy" target="_blank">Aftermath of a Data Breach Study</a>, was conducted to better understand how a data breach affects organizations over the long term. In this study, IT professionals weigh in on how their organizations dealt with a data breach that had both serious financial and reputational consequences. While we asked respondents to focus on just one breach, 85 percent say that their organizations had more than one breach involving customer/consumer data in the past 24 months. It is interesting to note that in many cases it took a serious data breach to make privacy and data protection a greater priority and allocate additional resources to the IT security function.</p>
<p>While many respondents were unable to determine the root cause of the data breach, there is a consensus among respondents that insider negligence is making their organizations vulnerable to a data breach. As a result, organizations are investing in training and awareness and technologies that minimize the human factor risk.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"> <a title="Ponemone Reputation of Data Breach Study" href="http://www.experian.com/innovation/business-resources/reputation-impact-data-breach.jsp?WT.srch=ecd_dbres_blog_012512_article ">Download the Ponemon Reputation Impact Study</a> to learn what executives are saying about how a data breach can affect the reputation and image of an organization.</div></div>
<p>The findings also show the concern organizations have about <a title="How data breaches harm reputations" href="http://www.experian.com/blogs/data-breach/2012/01/17/how-data-breaches-harm-reputations/" target="_blank">losing the loyalty</a> of their customers. Of the IT practitioners surveyed, few felt that prompt notification to victims was enough to reduce the negative consequences of the data breach. This suggests that compliance with data breach notifications laws in and of itself is not sufficient if an organization is concerned about customer loyalty and reputation. Other lessons learned from the data breach are to limit the amount of personal data collected, limit sharing with third parties and limit the amount of personal data stored. We invite you to read the <a title="Ponemon Aftermath Study Landing Page" href="http://www.experian.com/PonemonAftermathStudy" target="_blank">full report here</a>.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/01/25/consequences-following-a-data-breach/&via=Experian_DBR&text=Consequences following a data breach&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/01/25/consequences-following-a-data-breach/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>A billion dollar crime that needs an urgent response</title>
		<link>http://www.experian.com/blogs/data-breach/2011/04/19/a-billion-dollar-crime-that-needs-an-urgent-response/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/04/19/a-billion-dollar-crime-that-needs-an-urgent-response/#comments</comments>
		<pubDate>Tue, 19 Apr 2011 15:22:18 +0000</pubDate>
		<dc:creator>lponemon</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[Medical Data Breach]]></category>
		<category><![CDATA[medical fraud]]></category>
		<category><![CDATA[Medical identity theft]]></category>
		<category><![CDATA[Ponemon Institute]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=501</guid>
		<description><![CDATA[According to Ponemon Institute’s Second Annual Survey on Medical Identity Theft, we estimate that more than 1.49 million Americans have been targeted by this crime. With an average cost per victim of $20,663 the total national economic impact of medical identity theft crimes is more than $30 billion.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F04%2F19%2Fa-billion-dollar-crime-that-needs-an-urgent-response%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Security,Identity+Theft,Identity+Theft+Prevention,Medical+Data+Breach,medical+fraud,Medical+identity+theft,Ponemon+Institute&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><em><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/04/HealthCare-Medical-Identity-Theft.jpg"><img class="aligncenter size-full wp-image-504" title="HealthCare Medical Identity Theft" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/04/HealthCare-Medical-Identity-Theft.jpg" alt="" width="400" height="300" /></a></em></p>
<p><em>Our guest blogger this week is Dr. Larry Ponemon, Chairman and Founder of the </em><em><a rel="”nofollow” nofollow" href="http://www.ponemon.org/management" target="_blank" class="broken_link"><em>Ponemon Institute</em></a></em><em>.</em><em></em></p>
<p><em>Join us on Tuesday, April 26th for a live webinar with Dr. Larry Ponemon presenting </em><em><a href="http://www.bulldogsolutions.net/ExperianDataBreach/EXT1008/frmRegistration.aspx?bdls=27679" target="_blank" class="broken_link" rel="nofollow"><em>Medical Identity Theft Trends: The Importance of Securing Healthcare Data</em></a></em><em>. </em></p>
<p>What are some of the dire consequences of medical identity theft? It could be the shock of receiving a collection letter requesting immediate payment for an expensive medical procedure you never had. Or, it might result in a mistake on your healthcare record that could threaten insurance coverage or worse yet cause you to receive the wrong medical treatment.</p>
<p>According to Ponemon Institute’s <em>Second Annual Survey on Medical Identity Theft</em>, we estimate that more than 1.49 million Americans have been targeted by this crime. With an average cost per victim of $20,663 the total national economic impact of medical identity theft crimes is more than $30 billion.</p>
<p>Why is medical identity theft on the rise? First, we found that consumers lack awareness about this crime, which could make them more complacent and more vulnerable. Second, medical identity theft is often a family affair. More than one-third of victims in our study say that it was a family member who took their personal identification credentials. Finally, the victims tend to be older with a greater likelihood of having Medicare and other Social Security benefits. They also may not be as savvy about the need to protect their medical identity.</p>
<p>Consumers can minimize their risk by safeguarding their medical credentials and making sure they provide sensitive information only to appropriate healthcare organizations that take the security of health records seriously. Consumers also should monitor health records and credit reports to make sure that if their identity is stolen the incident can be resolved as soon as possible. In turn, <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">organizations have a responsibility</a> to protect patients’ records from being lost or stolen and to inform consumers of the need to safeguard their medical credentials. Taking such steps is critical to reducing this billion-dollar crime.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/04/19/a-billion-dollar-crime-that-needs-an-urgent-response/&via=Experian_DBR&text=A billion dollar crime that needs an urgent response&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/04/19/a-billion-dollar-crime-that-needs-an-urgent-response/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>