Breach Notification

Make Sure You Are Really Protected After a Data Breach

Posted on Sep 09 2014 by

I can’t remember more high profile breaches occurring in such close succession, as has been the case over the last year.  These “mega” breaches have spurred an enormous amount of attention on the topic and, while more education and dialogue around breaches and identity theft is beneficial, it also produces a proliferation of misinformation. For […]

Share

Stress, Apathy and Winning by Default: How Consumers Respond to Data Breach Notification Letters

Posted on Jun 26 2014 by

Data breach notification letters serve multiple purposes. They ensure a breached company is compliant with data breach notification laws, they alert consumers to the breach and their involvement in it, they can warn customers of potential identity theft risks and educate them on how to cope with those risks. The one thing no company wants […]

Share

The Worst Things You can Say or Do in a Breach Notification Letter

Posted on May 06 2014 by

When a data breach occurs, laws and industry regulations, dictate when and if you need to notify consumers whose data might have been compromised. However, many consumers would also probably argue that you’re morally obligated, to notify them of data loss; they want you to tell them of the breach and to do so in […]

Share

Data Breach News for the First Quarter of 2014

Posted on Apr 08 2014 by

With the first quarter of 2014 drawing to a close, now is a good time to review data breach news from the past four months and consider what that information may indicate about the state of cyber security in American businesses. As of March 21, 2014, 191 data breaches had been reported, according to the […]

Share

Thinking Globally at IAPP March 5-7: The International Data Breach Response

Posted on Feb 25 2014 by

When a data breach occurs, will you turn to your carefully crafted data breach response plan … and find it lacking? If your business operates globally, but you were only thinking domestically when you created your response plan, you may find that plan is insufficient for your needs when a cross-border data breach occurs. When […]

Share

Not All Cyber Claims are Created Equal. Find Out Why at the NetDiligence Forum

Posted on Oct 02 2013 by

Cyber claims are as individual as the organizations that file them.  Join us at the 7th Annual NetDiligence® Cyber Risk & Privacy Forum, Oct. 10-11, 2013 in Los Angeles, to find out why each claim is different and what to expect after filing one. Ozzie Fonseca, Senior Director with Experian® Data Breach Resolution, will join […]

Share

Roadmap to Business Associate Agreements

Posted on Sep 20 2013 by

Under the new HIPAA Omnibus Rule, business associate agreements (BAA) are required more often. But do you know how often? This is crucial to know because the Omnibus Rule compliance deadline is Sept. 23, 2013. BAAs are still required between healthcare organizations and business associates, as they were in the past, but now, they are also required […]

Share

The Top Complications of Breach Response: Learn What Not to Overlook at IAPP

Posted on Sep 17 2013 by

The IAPP Privacy Academy, September 30-October 2, 2013 in Seattle, is the place to be to learn all about today’s privacy and data protection challenges, including the top complications of breach response. Alex Ricardo, Director of Breach Response Services for Beazley Group, and I will share our insider perspective on anticipating and managing common hurdles […]

Share

California Takes a Hard Look at Data Breaches

Posted on Jul 31 2013 by

Recently, California’s Attorney General Kamala Harris released a first-of-its-kind report, detailing the 2012 data breaches from her state. The report has generated strong conversation throughout the industry, as it rightly should, in the name of transparency. This move comes as she continues to push companies in her state to improve their security practices. What caught […]

Share

How Many Data Breach Resolution Providers Does it Take?

Posted on Jul 17 2013 by

In today’s data driven world, most security experts agree that when it comes to data breaches, most businesses need to recognize it’s not a matter of what to do “if “ they experience a breach but what to do WHEN they experience a breach. After an incident is first discovered, in addition to implementing a […]

Share