<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; Breach Notification</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/category/breach-notification/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>Federal breach notice: A view worth the climb?</title>
		<link>http://www.experian.com/blogs/data-breach/2012/10/16/federal-breach-notice-a-view-worth-the-climb/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/10/16/federal-breach-notice-a-view-worth-the-climb/#comments</comments>
		<pubDate>Tue, 16 Oct 2012 20:09:05 +0000</pubDate>
		<dc:creator>gredmon</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[National Cyber Security Awareness Month]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1669</guid>
		<description><![CDATA[Working for a company that navigates 46 different state breach notice laws and a plethora of sector based federal breach notice laws, I’m often asked what I think the likelihood is that the Federal Government will pass a comprehensive data breach notification law that supersedes all the state laws. ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F10%2F16%2Ffederal-breach-notice-a-view-worth-the-climb%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Data+Breach,Data+Breach+Notification,data+breach+response,Data+Security,National+Cyber+Security+Awareness+Month&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><em><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/10/federal-breach-notice_a-view-worth-the-climb.jpg"><img class="aligncenter  wp-image-1673" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/10/federal-breach-notice_a-view-worth-the-climb.jpg" alt="" width="441" height="441" /></a></em></p>
<p>&nbsp;</p>
<p><em>Our guest blogger this week is Gant Redmon, General Counsel &amp; Vice President of Business Development at Co3 Systems.</em></p>
<p>Working for a company that navigates 46 different state breach notice laws and a plethora of sector based federal breach notice laws, I’m often asked what I think the likelihood is that the Federal Government will pass a comprehensive data breach notification law that supersedes all the state laws. While I don’t rule out a federal law passing at some point, I see it setting a floor of breach response responsibility rather than superseding everything already in place.</p>
<p>Put yourself in the shoes of a legislator trying to harmonize all the different state laws. That legislator is going to have three big political challenges.</p>
<p>The first challenge is choosing a single standard in the face of wildly different state standards. How will affected states feel about the Federal government imposing a different standard than the one they’ve settled on? Changing the rules in dozens of states will cause upheaval with political fallout.</p>
<p>The second challenge will be dealing with state attorneys general and treasurers. State AG’s are becoming more and more active in tracking breaches and cracking down on companies that don’t provide proper notice or have adequate security procedures. Part of that crackdown includes fines collected that go to the state treasury. A federal law will strip those AGs of the rule of privacy protectors and redirect funds to the federal government and away from the states.</p>
<p>The third challenge is that some states, like California and Virginia, go above even Federal notice requirements. What legislator wants to be known as the one who diluted people’s privacy rights by pre-empting strong protections and replacing them with weaker ones?</p>
<p>When trying to solve a problem, the first thing I ask is if I’m dealing with a problem worth solving. Privacy professionals and law firms have become well versed in the different state laws. Software solutions also exist that track all the different laws and provide incident response plans that are easy to follow. If the problem here is the complexity involved in dealing with disparate state breach notice laws, then we don’t have a problem worth solving.</p>
<p><em>“The opinions reflected in this article are solely those of the author and do not reflect the views of Experian Data Breach Resolution or any of its sister companies.”</em></p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/10/16/federal-breach-notice-a-view-worth-the-climb/&via=Experian_DBR&text=Federal breach notice: A view worth the climb?&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/10/16/federal-breach-notice-a-view-worth-the-climb/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Connecticut gets serious about breach reporting</title>
		<link>http://www.experian.com/blogs/data-breach/2012/10/02/connecticut-gets-serious-about-breach-reporting/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/10/02/connecticut-gets-serious-about-breach-reporting/#comments</comments>
		<pubDate>Tue, 02 Oct 2012 15:03:48 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[National Cyber Security Awareness Month]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1650</guid>
		<description><![CDATA[Get ready, Connecticut. A new data breach law is now in effect that brings the Office of the Attorney General (OAG) into the reporting loop. The new law requires notifying the OAG by email no later than when affected consumers are notified. Previously, businesses were only required to report a breach to consumers. Yet Attorney [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F10%2F02%2Fconnecticut-gets-serious-about-breach-reporting%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach,Data+Breach+Notification,data+breach+response,National+Cyber+Security+Awareness+Month&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/10/connecticut-gets-serious-about-breach-reporting.png"><img class="aligncenter  wp-image-1653" title="connecticut-gets-serious-about-breach-reporting" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/10/connecticut-gets-serious-about-breach-reporting.png" alt="" width="547" height="318" /></a></p>
<p>Get ready, Connecticut. A new data breach law is now in effect that brings the Office of the Attorney General (OAG) into the reporting loop.</p>
<p>The new law requires notifying the OAG by email no later than when affected consumers are notified. Previously, businesses were only required to report a breach to consumers. Yet Attorney General George Jepsen and his office were tasked with enforcing state breach laws – hard to do when you don’t know about the incidents.</p>
<p>But that’s all changed. Assistant Attorney General Matthew Fitzsimmons and the office’s Privacy Task Force will monitor the incoming emails. The new reporting requirement and newish task force (it was created last year) give the OAG more oversight of breach activity that may be putting consumers at risk. With more oversight comes better enforcement – at least that’s certainly what the OAG hopes.</p>
<p>Connecticut requires consumer notification when a breach involves unencrypted, computerized personal data. The state’s definition of “personal data” includes someone’s first and last names in combination with at least one of three data types: a Social Security number; a driver’s license or state identification number; or a financial account number, such as a credit card number, along with the access code for the account.</p>
<p>Businesses that don’t comply with the new law may find themselves in violation of the state’s Fair Trade Practices Act. Remember that sooner is better than later when it comes to breach reporting. At least if you want to avoid fines and violations.</p>
<p>Here’s the new email address for reporting breaches in Connecticut: <a href="mailto:ag.breach@ct.gov">ag.breach@ct.gov</a>.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"> <a href="http://www.experian.com/innovation/business-resources/ponemon-notification-study.jsp?WT.srch=ecd_dbres_blog_100212_article">Download the Ponemon Notification Study to find out what kind of notification letters your customers want &#8211; and why it&#8217;s important to deliver.</a> </div></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/10/02/connecticut-gets-serious-about-breach-reporting/&via=Experian_DBR&text=Connecticut gets serious about breach reporting&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F10%2F02%2Fconnecticut-gets-serious-about-breach-reporting%2F&amp;title=Connecticut%20gets%20serious%20about%20breach%20reporting" id="wpa2a_2"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/10/02/connecticut-gets-serious-about-breach-reporting/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Infographic: Our clients speak out</title>
		<link>http://www.experian.com/blogs/data-breach/2012/09/11/infographic-our-clients-speak-out/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/09/11/infographic-our-clients-speak-out/#comments</comments>
		<pubDate>Tue, 11 Sep 2012 21:12:21 +0000</pubDate>
		<dc:creator>mbruemmer</dc:creator>
				<category><![CDATA[Breach Notification]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1603</guid>
		<description><![CDATA[Experian Data Breach Resolution surveyed a sample of clients to find out who they are and what they think of our services. Tweet]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F09%2F11%2Finfographic-our-clients-speak-out%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=%23databreach&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>Experian Data Breach Resolution surveyed a sample of clients to find out who they are and what they think of our services.</p>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/09/experian-clients-speak-out.jpg"><img class="aligncenter size-full wp-image-1614" title="experian-clients-speak-out" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/09/experian-clients-speak-out.jpg" alt="" width="612" height="792" /></a></p>
<p style="text-align: center;">
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/09/11/infographic-our-clients-speak-out/&via=Experian_DBR&text=Infographic: Our clients speak out&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F09%2F11%2Finfographic-our-clients-speak-out%2F&amp;title=Infographic%3A%20Our%20clients%20speak%20out" id="wpa2a_4"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/09/11/infographic-our-clients-speak-out/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>U.S. beats Germany, U.K. and France when it comes to data breach notification costs, but why?</title>
		<link>http://www.experian.com/blogs/data-breach/2012/08/28/u-s-beats-germany-u-k-and-france-when-it-comes-to-data-breach-notification-but-why/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/08/28/u-s-beats-germany-u-k-and-france-when-it-comes-to-data-breach-notification-but-why/#comments</comments>
		<pubDate>Tue, 28 Aug 2012 20:29:00 +0000</pubDate>
		<dc:creator>mbruemmer</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[Ponemon Institute]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1564</guid>
		<description><![CDATA[The U.S. tops Germany, the U.K. and France when it comes to data breach notification costs. In other words, it costs American companies more to notify people of a data breach when their personal information is lost or stolen. The Ponemon Institute, which recently conducted a global data breach study, found that it cost U.S. [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F08%2F28%2Fu-s-beats-germany-u-k-and-france-when-it-comes-to-data-breach-notification-but-why%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach,Data+Breach+Notification,Ponemon+Institute&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/08/data-breach-cost.png"><img class="aligncenter  wp-image-1565" title="data-breach-cost" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/08/data-breach-cost.png" alt="" width="500" height="344" /></a></p>
<p>The U.S. tops Germany, the U.K. and France when it comes to<a title="Ponemon Notification Study" href="http://www.experian.com/innovation/business-resources/ponemon-notification-study.jsp"> data breach notification costs</a>. In other words, it costs American companies more to notify people of a data breach when their personal information is lost or stolen.</p>
<p>The Ponemon Institute, which recently conducted a global data breach study, found that it cost U.S. companies an average of $561,500 to notify victims per breach, compared to $303,600 for German companies and $223,100 for companies in the U.K. Even more interesting, is that in some countries – like India and Australia – companies only spend an average of $31,000 (India) and $80,000 (Australia) to notify customers of a data breach. (All figures are U.S. dollars)</p>
<p>So why do American companies spend so much more on <a title="Ponemon Notification Study" href="http://www.experian.com/innovation/business-resources/ponemon-notification-study.jsp">data breach notification</a>?</p>
<p>The answer is mainly due to numerous laws and regulations. Currently, 46 states have breach notification laws and several federal agencies, such as the Department of Health and<strong> </strong>Human Services, require organizations to notify potential victims when their unsecured protected health information is breached.</p>
<p>In contrast, countries without breach notification laws – like India and Australia – spend much less because they don’t have to notify all of their data breach victims. Countries like Germany and the U.K. have strict notification requirements, although not as tough as the U.S.</p>
<p>American companies and organizations may not be able to do much about notification costs, which are expected to continue to rise. But there are other measures that can be taken to lower the cost of a breach. For example:</p>
<ul>
<li>Negotiating a pre-breach agreement with a data breach resolution provider to lock in a good rate ahead of time.</li>
<li>A chief information security officer (CISO) who is responsible for enterprise data protection can reduce the cost of a breach by as much as $80 per record, according to the Ponemon Institute.</li>
<li>Increased loyalty by treating potential victims fairly and providing them with credit and/or identity protection can prevent the loss of customers and potentially save millions.</li>
</ul>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/08/28/u-s-beats-germany-u-k-and-france-when-it-comes-to-data-breach-notification-but-why/&via=Experian_DBR&text=U.S. beats Germany, U.K. and France when it comes to data breach notification costs, but why?&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F08%2F28%2Fu-s-beats-germany-u-k-and-france-when-it-comes-to-data-breach-notification-but-why%2F&amp;title=U.S.%20beats%20Germany%2C%20U.K.%20and%20France%20when%20it%20comes%20to%20data%20breach%20notification%20costs%2C%20but%20why%3F" id="wpa2a_6"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/08/28/u-s-beats-germany-u-k-and-france-when-it-comes-to-data-breach-notification-but-why/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Vigilance is still the best medicine for avoiding medical identity theft</title>
		<link>http://www.experian.com/blogs/data-breach/2012/06/26/vigilance-is-still-the-best-medicine-for-avoiding-medical-identity-theft/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/06/26/vigilance-is-still-the-best-medicine-for-avoiding-medical-identity-theft/#comments</comments>
		<pubDate>Tue, 26 Jun 2012 18:09:33 +0000</pubDate>
		<dc:creator>mbruemmer</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Medical Data Breach]]></category>
		<category><![CDATA[medical fraud]]></category>
		<category><![CDATA[Medical identity theft]]></category>
		<category><![CDATA[Ponemon Institute]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1378</guid>
		<description><![CDATA[  The latest Ponemon Institute Medical Identity Theft survey reflects the classic good news, bad news scenario. The good news is that more consumers understand how medical identity theft happens, and the importance of checking healthcare invoices and records for accuracy. The bad news is that the victim count has hit an all-time high (nearly [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F06%2F26%2Fvigilance-is-still-the-best-medicine-for-avoiding-medical-identity-theft%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=HIPAA,Identity+Theft,Medical+Data+Breach,medical+fraud,Medical+identity+theft,Ponemon+Institute&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/06/Chief-Medical-Information-Officer1.jpg"><img class="aligncenter size-full wp-image-1402" title="Doctor conducting research" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/06/Chief-Medical-Information-Officer1.jpg" alt="" width="448" height="299" /></a></p>
<p>The latest <a title="Ponemon Medical ID Study Download" href="http://www.experian.com/innovation/business-resources/ponemon-third-annual-medical-id-theft-study.jsp">Ponemon Institute Medical Identity Theft </a>survey reflects the classic good news, bad news scenario. The good news is that more consumers understand how medical identity theft happens, and the importance of checking healthcare invoices and records for accuracy. The bad news is that the victim count has hit an all-time high (nearly 2 million annually), while breach frequency and financial damages continue<br />
to rise, unabated.   </p>
<p><strong>Losses up 44% from 2010</strong></p>
<p>Data extrapolated for 2012 reveals that losses from medical identity theft will top $40 billion, up 34% from last year and 44% from 2010. During any given hour thieves using pilfered credentials will steal nearly $5 million worth of medical services, equipment and prescriptions.</p>
<p>The survey also revealed:</p>
<ul>
<li><strong>Higher costs for recovery and resolution</strong>: victims pay on average $22,346<br />
(up 10% from 2011) to resolve medical identity theft, including the cost of identity theft protection and retaining legal counsel</li>
<li><strong>Difficulty knowing when the crime occurred</strong>: one quarter of those asked did not know when their medical identity was stolen, while 34% said it took more than a year to find out</li>
<li><strong>Collection letters still top the list</strong>: though more consumers learn of medical identity theft from suspicious statement or invoice entries, nearly 40% of victims first hear of their misfortune through collection letters</li>
</ul>
<p>In a subtle but potentially instructive revelation, just 4% of survey respondents said a healthcare provider or insurance company notified them of the theft.  </p>
<p><strong>Providers beware</strong></p>
<p>So how is all this flavoring consumers’ attitudes toward healthcare and insurance providers? The biggest non-financial consequence, according to Ponemon, is a loss of trust and confidence. If people perceive a lack of effective data safeguards, most (58%) feel no compunction about going elsewhere for services. If their medical records were ever lost or stolen 56% of respondents would also feel justified making a change.  </p>
<p><strong>Watch the vital signs</strong></p>
<p>The top three actions desired by victims following medical identity theft include: reimbursement for the costs of changing providers; <a title="Ponemon Notification Study Download" href="http://www.experian.com/innovation/business-resources/ponemon-notification-study.jsp">prompt notification of the loss or theft</a>; and free <a title="ProtectMyID" href="http://www.protectmyid.com/" class="broken_link" rel="nofollow">identity theft protection </a>for at least one year. (Hint: Providers can use these survey insights to develop post-breach strategies and programs aimed at reestablishing trust and confidence.)  </p>
<p>Employers can also play a role in medical identity theft awareness by encouraging (and if needed, teaching) employees how to:</p>
<ul>
<li>Keep medical information private</li>
<li>Regularly check medical records for accuracy (57% of those surveyed don’t)</li>
<li>Be more proactive about monitoring statements and charges</li>
<li>Review and interpret credit reports</li>
<li>Engage an identity theft protection service</li>
</ul>
<p>Bottom line? When it comes to <a title="Ponemon Medical ID Study Download" href="http://www.experian.com/innovation/business-resources/ponemon-third-annual-medical-id-theft-study.jsp">medical identity theft</a>, vigilance is good medicine&#8211;for consumers and healthcare providers alike.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff">Webinar Download: Healthcare Information Security Today conducted a survey to provide an in-dpeth assessment of the effectiveness of data protection efforts. <a title="Healthcare Info Security Webinar" href="http://www.experian.com/innovation/business-resources/cyber-insurance-data-breach-response-plan.jsp?WT.srch=ecd_dbres_blog_062612_article  ">View Now!</a> </div></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/06/26/vigilance-is-still-the-best-medicine-for-avoiding-medical-identity-theft/&via=Experian_DBR&text=Vigilance is still the best medicine for avoiding medical identity theft&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F06%2F26%2Fvigilance-is-still-the-best-medicine-for-avoiding-medical-identity-theft%2F&amp;title=Vigilance%20is%20still%20the%20best%20medicine%20for%20avoiding%20medical%20identity%20theft" id="wpa2a_8"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/06/26/vigilance-is-still-the-best-medicine-for-avoiding-medical-identity-theft/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Three reasons your breach notices are flawed</title>
		<link>http://www.experian.com/blogs/data-breach/2012/06/05/three-reasons-your-breach-notices-are-flawed/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/06/05/three-reasons-your-breach-notices-are-flawed/#comments</comments>
		<pubDate>Tue, 05 Jun 2012 17:14:18 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[Ponemon Institute]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1286</guid>
		<description><![CDATA[Still using the less-is-more approach to notification letters? As it turns out, consumers want more – much more than they’re getting. In a new study, 72% of consumers who recall receiving a notification letter express disappointment. The Ponemon Institute explores why in the 2012 Consumer Study on Data Breach Notification. Among all survey respondents, those [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F06%2F05%2Fthree-reasons-your-breach-notices-are-flawed%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach+Notification,data+breach+response,Ponemon+Institute&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/06/stack-of-letters.jpg"><img class="aligncenter size-full wp-image-1292" title="stack-of-letters" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/06/stack-of-letters.jpg" alt="" width="454" height="184" /></a></p>
<p>Still using the less-is-more approach to notification letters? As it turns out, consumers want more – much more than they’re getting.</p>
<p>In a new study, 72% of consumers who recall receiving a notification letter express disappointment. The Ponemon Institute explores why in the 2012 Consumer Study on<a title="Ponemon Notification Study Download" href="http://www.experian.com/data-breach/ponemon-notification-study.html?WT.srch=ecd_dbres_notification_blog_article"> Data Breach Notification</a>.</p>
<p>Among all survey respondents, those who do and do not recall receiving a notice, 85% verify that learning about the loss or theft of their data is pertinent to them. But only if there’s a certainty of risk, a belief shared by 57% of respondents. An even larger percentage (63%) feels entitled to compensation, such as credit monitoring or identity protection, if their data is lost.</p>
<p>Yet, despite having clear ideas on what they do or don’t want following the loss of their data, most consumers aren’t paying attention to<a title="What consumers should know about data breach notification" href="http://www.experian.com/blogs/data-breach/2011/11/02/what-consumers-should-know-about-data-breach-notification/"> breach notices</a>, according to Ponemon. Only 25% of participants in the study could recall receiving one. Among that group, 35% recalled receiving at least three.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Ponemone Consumer Study on Data Breach Notification" href="http://www.experian.com/innovation/business-resources/ponemon-notification-study.jsp?WT.srch=ecd_dbres_blog_060512_article ">Download the 2012 Consumer Study on Data Breach Notification </a>to find out why consumers are critical of the notification letters they receive. </div></div>
<p>It’s this subset of the study that provides valuable insight into why today’s notifications aren’t working. Here are three flaws:</p>
<p>1. Too Few Details<br />
Sixty-seven percent of respondents who recall receiving a breach notice did not receive enough information about the incident. That includes 44% who did not know what type of data had been lost or stolen, leaving them unsure of what steps to take to protect themselves.</p>
<p>2. Difficult to Understand<br />
Sixty-one percent did not understand the notification, largely due to the length of the letter and complexity of the language. In addition, 37% had no idea what the incident was about even after reading the notice. This led 41% to assume their data had been stolen.</p>
<p>3. Not Believable<br />
Forty-five percent found the message in the letter unbelievable, and 44% of them believed the company was hiding key facts about the breach.</p>
<p>Consumers acted on their disappointment to varying degrees:<br />
• 15% planned to terminate their relationship with the breached company<br />
• 39% contemplated doing so<br />
• 35% would continue the relationship so long as the organization doesn’t experience another breach</p>
<p>The numbers reflect poorly on today’s notification efforts, confirming the need for change. Consumers want simple language and clear explanations of what happened and the risks they face, plus a protection product to compensate for the data exposure, according to the study.</p>
<p>So why not work with your legal counsel to deliver just that in a way that protects your company and satisfies your consumers? Otherwise, your breach notices will continue to alienate and confuse. As <a title="Ponemon Notification Study" href="http://www.experian.com/data-breach/ponemon-notification-study.html?WT.srch=ecd_dbres_notification_blog_article">this study </a>shows, that only serves to erode customer loyalty and trust, making data loss even more costly in the long run.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/06/05/three-reasons-your-breach-notices-are-flawed/&via=Experian_DBR&text=Three reasons your breach notices are flawed&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F06%2F05%2Fthree-reasons-your-breach-notices-are-flawed%2F&amp;title=Three%20reasons%20your%20breach%20notices%20are%20flawed" id="wpa2a_10"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/06/05/three-reasons-your-breach-notices-are-flawed/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Case closed: 8 Things you didn’t know about data breach litigation</title>
		<link>http://www.experian.com/blogs/data-breach/2012/05/22/case-closed-8-things-you-didn%e2%80%99t-know-about-data-breach-litigation/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/05/22/case-closed-8-things-you-didn%e2%80%99t-know-about-data-breach-litigation/#comments</comments>
		<pubDate>Tue, 22 May 2012 15:46:29 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[cyber-insurance]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[ProtectMyID]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1265</guid>
		<description><![CDATA[As data breaches have exploded in frequency and scale, it’s no surprise that corresponding lawsuits have also flourished.  Do these lawsuits have a common pattern?  A recent draft research paper, Empirical Analysis of Data Breach Litigation, takes a look at federal data breach lawsuits to assess the common characteristics. The findings were illuminating: The odds [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F05%2F22%2Fcase-closed-8-things-you-didn%25e2%2580%2599t-know-about-data-breach-litigation%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Cyber+Security,cyber-insurance,Data+Breach,ProtectMyID&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/05/litigation.jpg"><img class="aligncenter size-full wp-image-1267" title="litigation" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/05/litigation.jpg" alt="" width="474" height="240" /></a></p>
<p>As <a title="unlock data breach facts" href="http://www.experian.com/blogs/data-breach/2012/03/12/unlock-data-breach-facts/" target="_blank">data breaches</a> have exploded in frequency and scale, it’s no surprise that corresponding lawsuits have also flourished.  Do these lawsuits have a common pattern?  A recent draft research paper, <a title="empirical analysis of data breach litigation" href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1986461" target="_blank" class="broken_link" rel="nofollow">Empirical Analysis of Data Breach Litigation,</a> takes a look at federal <a title="data breach lawsuits" href="http://www.experian.com/blogs/data-breach/2012/01/10/quick-glance-data-breach-litigation-legislation-in-2012/" target="_blank">data breach lawsuits</a> to assess the common characteristics.</p>
<p>The findings were illuminating:</p>
<ol>
<li>The odds of a firm being sued in federal court are three and a half times greater when individuals suffer <a title="extended fraud resolution" href="http://www.experian.com/blogs/data-breach/2012/03/05/extended-fraud-resolution-is-the-new-standard/" target="_blank">financial harm</a>, but over six times lower when the firm provides free <a title="ProtectMyID Elite" href="http://www.experian.com/data-breach/identity-theft-monitoring.html" target="_blank">credit monitoring</a>.</li>
<li>The odds of a firm being sued from improperly disposing data are three times greater relative to breaches caused by lost/stolen data, and six times greater when the data breach involves the loss of financial information.</li>
<li>Defendants settle 30% more often when plaintiffs allege financial loss from a data breach or when faced with a certified class action suit.</li>
<li>Plaintiffs seeking statutory damages are not more likely to achieve a settlement.</li>
<li>The odds of a settlement are 10 times greater when the breach is caused by a cyber-attack, relative to lost or stolen hardware.</li>
<li>While the compromise of financial information led to more litigation, it does not appear to increase a plaintiff’s chance of a settlement. Instead, compromise of medical information is most strongly correlated with settlement.</li>
<li>Only about four percent of reported breaches result in federal litigation.</li>
<li>Of the federal actions coded, there are over 86 different kinds causes of data breach actions brought by plaintiffs for essentially the same kind of event.</li>
</ol>
<p>The report hopes that the research will serve as a useful guide to firms trying to determine the chances of exposure to a lawsuit and the likelihood of settlement.  Insurance markets might also find the report helpful as a measure for pricing <a title="cyber liability insurance" href="http://www.experian.com/blogs/data-breach/2011/06/14/cyber-liability-insurance-5-fast-facts/" target="_blank">cyber-insurance policies</a>, and plaintiffs and defense attorneys can be helped through insight into the trends around data breach litigation.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Experian Data Breach Resource Center" href="http://www.experian.com/data-breach/data-breach-information.html?WT.srch=ecd_dbres_blog_052212_article ">Explore Our Resource Center for Videos, Webinars, White Papers and More</a>!</div></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/05/22/case-closed-8-things-you-didn%e2%80%99t-know-about-data-breach-litigation/&via=Experian_DBR&text=Case closed: 8 Things you didn’t know about data breach litigation&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F05%2F22%2Fcase-closed-8-things-you-didn%25e2%2580%2599t-know-about-data-breach-litigation%2F&amp;title=Case%20closed%3A%208%20Things%20you%20didn%E2%80%99t%20know%20about%20data%20breach%20litigation" id="wpa2a_12"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/05/22/case-closed-8-things-you-didn%e2%80%99t-know-about-data-breach-litigation/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Infographic: Unlock data breach facts</title>
		<link>http://www.experian.com/blogs/data-breach/2012/03/12/unlock-data-breach-facts/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/03/12/unlock-data-breach-facts/#comments</comments>
		<pubDate>Mon, 12 Mar 2012 17:12:33 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Business identity theft]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[Ponemon Institute]]></category>
		<category><![CDATA[Security Breaches]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1071</guid>
		<description><![CDATA[Tweet]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F03%2F12%2Funlock-data-breach-facts%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Business+identity+theft,Data+Breach,Data+Breach+Notification,data+breach+response,Ponemon+Institute,Security+Breaches&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<div style="text-align: center;"><div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Ponemon Aftermath Study" href="http://www.experian.com/innovation/business-resources/aftermath-after-data-breach.jsp?WT.srch=ecd_dbres_blog_031212_article "> Download the Ponemon Aftermath Study</a> to learn what companies experience following a data loss</div></div></div>
<div style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/03/UnlockDateBreachFacts2.jpg"><img class="aligncenter size-full wp-image-1079" title="UnlockDateBreachFacts" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/03/UnlockDateBreachFacts2.jpg" alt="" width="466" height="816" /></a></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/03/12/unlock-data-breach-facts/&via=Experian_DBR&text=Infographic: Unlock data breach facts&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F03%2F12%2Funlock-data-breach-facts%2F&amp;title=Infographic%3A%20Unlock%20data%20breach%20facts" id="wpa2a_14"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/03/12/unlock-data-breach-facts/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The data breach reporting landscape &#8211; part 1</title>
		<link>http://www.experian.com/blogs/data-breach/2012/02/28/the-data-breach-reporting-landscape-part-1/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/02/28/the-data-breach-reporting-landscape-part-1/#comments</comments>
		<pubDate>Tue, 28 Feb 2012 16:25:22 +0000</pubDate>
		<dc:creator>kbarney</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Security Breaches]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1010</guid>
		<description><![CDATA[Our guest blogger this week is Karen Barney of the Identity Theft Resource Center (ITRC). As an organization specializing in monitoring and tracking data breaches, the ITRC has come across varying degrees of breaches and reasons for notification due to the varying types of compromised information. We would like to take this opportunity to address [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F02%2F28%2Fthe-data-breach-reporting-landscape-part-1%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach,Data+Breach+Notification,Data+Security,hackers,Security+Breaches&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/02/crumbling-lock.jpg"><img class="aligncenter size-full wp-image-1014" title="crumbling lock" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/02/crumbling-lock.jpg" alt="" width="509" height="338" /></a></p>
<p><em>Our guest blogger this week is Karen Barney of the Identity Theft Resource Center (ITRC).</em></p>
<p>As an organization specializing in monitoring and tracking data breaches, the <a title="itrc website" href="http://www.idtheftcenter.org/" class="broken_link" rel="nofollow">ITRC</a> has come across varying degrees of breaches and reasons for notification due to the varying types of compromised information. We would like to take this opportunity to address some of the differences and provide some insight into our approach for tracking data breach incidents.</p>
<p>According to most state laws, a data breach is an <em>incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so</em>. Data breaches may involve personal health information (PHI), personally identifiable information (PII), trade secrets or intellectual property.  Note that under these state breach laws, non-personal identifying information is <em>not</em> included.</p>
<p>Next, let’s consider hacking.  By definition, &#8220;hacking&#8221; is the deliberate and unauthorized access, use, disclosure, and/or taking of electronic data on a computer.  Hacking efforts target all types of information – from high level intellectual property down to individual personal information, both sensitive and non-sensitive information.  Taken together, these two situations result in nearly 26% of the “reported breaches” included on the 2011 Identity Theft Resource Center Breach List.</p>
<p>This brings us to the definition of “reported breaches”.  ITRC only publishes breach incident information which is available from credible, public resources.  Breach incidents are tracked daily from sources such as state Attorneys General offices, a variety of media sources, and other well-recognized and respected entities that track and capture this information from publicly available sources.  This approach means that the ITRC Breach Report only reflects the tip of the iceberg.</p>
<p>In 2011, 41% of the <a title="2011 Year of the Breach" href="http://www.experian.com/blogs/data-breach/2011/12/20/year-of-the-breach-2011-in-review/">breaches</a> on the ITRC report show the number of records exposed as “unknown.”  In addition, ITRC is aware of a significant number of breaches that are not made public.  As a result, it is not possible to provide truly accurate numbers – either for the number of breaches or the number of records.</p>
<p>The majority of “reported breaches” included in the list are those which have met “breach notification triggers” established by the various state laws regarding this issue.  Usually these incidents are electronic in nature, and must also expose information identified as PII, such as first and last name combined with a social security number, driver’s license or state identification number and/or financial account numbers (including debit and credit cards).   Some states have expanded this “trigger” definition to include medical and healthcare information.  This situation leaves large loopholes for breaches to remain unreported.</p>
<p>Currently we know that –</p>
<ul>
<li>An indeterminable number of breaches go unreported, even when <a title="Breach notification in three easy steps" href="http://www.experian.com/blogs/data-breach/2011/05/10/breach-notification-in-three-easy-steps/">notification</a> should have been triggered according to the applicable state laws.</li>
<li>Many breach notifications (at least what is disclosed by the entity) underreport the number of records</li>
<li>Many breach notifications also do not clearly define the types of information exposed.</li>
<li>Public information is often incomplete in detailing how the breach occurred</li>
<li>Many breaches involving non-PII, such as email addresses, user names, and passwords, are not reported because they do not meet “breach notification triggers” as established by various state laws</li>
</ul>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/02/28/the-data-breach-reporting-landscape-part-1/&via=Experian_DBR&text=The data breach reporting landscape - part 1&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F02%2F28%2Fthe-data-breach-reporting-landscape-part-1%2F&amp;title=The%20data%20breach%20reporting%20landscape%20%E2%80%93%20part%201" id="wpa2a_16"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/02/28/the-data-breach-reporting-landscape-part-1/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Are you in hiding after a data breach? Watch our new video.</title>
		<link>http://www.experian.com/blogs/data-breach/2012/01/31/947/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/01/31/947/#comments</comments>
		<pubDate>Tue, 31 Jan 2012 18:21:14 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Fraud Resolution]]></category>
		<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Breach Notification]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=947</guid>
		<description><![CDATA[http://www.youtube.com/watch?v=KTHWhscxGeU Tweet]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F01%2F31%2F947%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Data+Breach,Data+Breach+Notification&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.youtube.com/watch?v=KTHWhscxGeU">http://www.youtube.com/watch?v=KTHWhscxGeU</a></p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/01/31/947/&via=Experian_DBR&text=Are you in hiding after a data breach? Watch our new video.&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F01%2F31%2F947%2F&amp;title=Are%20you%20in%20hiding%20after%20a%20data%20breach%3F%20Watch%20our%20new%20video." id="wpa2a_18"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/01/31/947/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>