<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; breach notification fatigue</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/tag/breach-notification-fatigue/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>Consequences following a data breach</title>
		<link>http://www.experian.com/blogs/data-breach/2012/01/25/consequences-following-a-data-breach/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/01/25/consequences-following-a-data-breach/#comments</comments>
		<pubDate>Wed, 25 Jan 2012 16:58:48 +0000</pubDate>
		<dc:creator>lponemon</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Fraud Resolution]]></category>
		<category><![CDATA[breach notification fatigue]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[healthcare data breach]]></category>
		<category><![CDATA[Ponemon Institute]]></category>
		<category><![CDATA[privacy legislation]]></category>
		<category><![CDATA[ProtectMyID]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=923</guid>
		<description><![CDATA[Our latest study, Aftermath of a Data Breach Study, was conducted to better understand how a data breach affects organizations over the long term.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F01%2F25%2Fconsequences-following-a-data-breach%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+notification+fatigue,Data+Breach+Notification,data+breach+response,healthcare+data+breach,Ponemon+Institute,privacy+legislation,ProtectMyID&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/01/security-1024x722.jpg"><img class="aligncenter size-full wp-image-938" title="security-1024x722" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/01/security-1024x722.jpg" alt="" width="553" height="390" /></a></p>
<p><em>Our guest blogger this week is Dr. Larry Ponemon, Chairman and Founder of the <a title="Ponemon Institute Website" href="http://www.ponemon.org/index.php" target="_blank" class="broken_link" rel="nofollow">Ponemon Institute</a>.</em></p>
<p>Our latest study, <a title="Ponemon Aftermath Study Landing Page" href="http://www.experian.com/PonemonAftermathStudy" target="_blank">Aftermath of a Data Breach Study</a>, was conducted to better understand how a data breach affects organizations over the long term. In this study, IT professionals weigh in on how their organizations dealt with a data breach that had both serious financial and reputational consequences. While we asked respondents to focus on just one breach, 85 percent say that their organizations had more than one breach involving customer/consumer data in the past 24 months. It is interesting to note that in many cases it took a serious data breach to make privacy and data protection a greater priority and allocate additional resources to the IT security function.</p>
<p>While many respondents were unable to determine the root cause of the data breach, there is a consensus among respondents that insider negligence is making their organizations vulnerable to a data breach. As a result, organizations are investing in training and awareness and technologies that minimize the human factor risk.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"> <a title="Ponemone Reputation of Data Breach Study" href="http://www.experian.com/innovation/business-resources/reputation-impact-data-breach.jsp?WT.srch=ecd_dbres_blog_012512_article ">Download the Ponemon Reputation Impact Study</a> to learn what executives are saying about how a data breach can affect the reputation and image of an organization.</div></div>
<p>The findings also show the concern organizations have about <a title="How data breaches harm reputations" href="http://www.experian.com/blogs/data-breach/2012/01/17/how-data-breaches-harm-reputations/" target="_blank">losing the loyalty</a> of their customers. Of the IT practitioners surveyed, few felt that prompt notification to victims was enough to reduce the negative consequences of the data breach. This suggests that compliance with data breach notifications laws in and of itself is not sufficient if an organization is concerned about customer loyalty and reputation. Other lessons learned from the data breach are to limit the amount of personal data collected, limit sharing with third parties and limit the amount of personal data stored. We invite you to read the <a title="Ponemon Aftermath Study Landing Page" href="http://www.experian.com/PonemonAftermathStudy" target="_blank">full report here</a>.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/01/25/consequences-following-a-data-breach/&via=Experian_DBR&text=Consequences following a data breach&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/01/25/consequences-following-a-data-breach/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Quick glance: data breach litigation &amp; legislation in 2012</title>
		<link>http://www.experian.com/blogs/data-breach/2012/01/10/quick-glance-data-breach-litigation-legislation-in-2012/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/01/10/quick-glance-data-breach-litigation-legislation-in-2012/#comments</comments>
		<pubDate>Tue, 10 Jan 2012 16:53:34 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach notification fatigue]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Federal Trade Commission]]></category>
		<category><![CDATA[Security Breaches]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=912</guid>
		<description><![CDATA[With the recent spate of data breaches and accompanying class action lawsuits, businesses have constant reminders that an ounce of prevention is worth a pound of cure. The best way to protect your business against the high costs of data breaches is to ensure your security practices and fraud resolution plans are strongly built to ward off malicious attacks and the complications that follow.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F01%2F10%2Fquick-glance-data-breach-litigation-legislation-in-2012%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+notification+fatigue,breach+prevention,Data+Breach+Notification,data+breach+response,data+privacy,Federal+Trade+Commission,Security+Breaches&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>It was only a matter of time before a flood of class action lawsuits began to wash over breached companies. In general, these suits allege that a company: 1) did not adequately protect the sensitive data entrusted to it and 2) did not notify consumers of the breach in a timely enough manner. In 2011, after one of the biggest breaches of the year went public, it took just one day for the first class action lawsuit to be lodged.</p>
<p>The avalanche of recent breaches has been worrisome for consumers, causing lawyers, as well as lawmakers, to take note. Moving into 2012, businesses will want to carefully watch the changing landscape of litigation and legislation.<br />
Two recently submitted bills would require companies to inform affected customers, the <a title="Develop a data breach response plan" href="http://www.experian.com/blogs/data-breach/2011/02/22/develop-a-breach-response-plan-now-to-be-ready-to-efficiently-address-a-breach-as-soon-as-it-is-reported/" target="_blank">Federal Trade Commission</a> and law authorities of a data loss within 48 hours of completing a breach assessment.</p>
<p>No matter the outcome of these bills, companies that delay making their breaches public will continue to face the consequences. In 2011, a large financial institution found itself in hot water after waiting weeks to notify customers of a breach. The controversial delay prompted a leading industry group representing the country’s largest financial institutions to testify before congress. The testimony suggested that banks should immediately notify federal officials and affected customers of a breach.</p>
<p>While the outcome of recent litigation remains to be seen, many lawyers expect these suits to inevitably increase in size – and rewards. To date, Internet privacy-related lawsuits have yet to yield the hefty settlements of securities fraud cases. Still, with the escalating breadth of data breaches, higher profile law firms, ones known for mounting successful security fraud litigation on behalf of shareholders, are getting involved.</p>
<p>The challenge for plaintiffs’ lawyers in security breach cases is not in proving liability but establishing damages. Judges must determine whether the compromise of personal data represents a loss of value or if there should be additional proof of tangible harm.</p>
<p>With the recent spate of data breaches and accompanying class action lawsuits, businesses have constant reminders that an ounce of <a title="Data breaches - to prepare or not to prepare?" href="http://www.experian.com/blogs/data-breach/2011/05/17/data-breaches-%E2%80%93-to-prepare-or-not-to-prepare-the-answer-is-simple/" target="_blank">prevention</a> is worth a pound of cure. The best way to protect your business against the high costs of data breaches is to ensure your<a title="Data Breach homepage" href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank"> security practices and fraud resolution</a> plans are strongly built to ward off malicious attacks and the complications that follow.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/01/10/quick-glance-data-breach-litigation-legislation-in-2012/&via=Experian_DBR&text=Quick glance: data breach litigation & legislation in 2012&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/01/10/quick-glance-data-breach-litigation-legislation-in-2012/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Over-reporting vs. under-reporting data breaches</title>
		<link>http://www.experian.com/blogs/data-breach/2011/09/20/over-reporting-vs-under-reporting-data-breaches/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/09/20/over-reporting-vs-under-reporting-data-breaches/#comments</comments>
		<pubDate>Tue, 20 Sep 2011 18:40:22 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[breach notification fatigue]]></category>
		<category><![CDATA[national data breach notification law]]></category>
		<category><![CDATA[Personal Data Privacy and Security Act]]></category>
		<category><![CDATA[S.B. 1386]]></category>
		<category><![CDATA[Secure and Fortify Electronic Data Act]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=784</guid>
		<description><![CDATA[The onslaught of significant data breaches in the past year has once again spurred legislators to push for national data breach notification legislation.  ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F09%2F20%2Fover-reporting-vs-under-reporting-data-breaches%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+notification+fatigue,national+data+breach+notification+law,Personal+Data+Privacy+and+Security+Act,S.B.+1386,Secure+and+Fortify+Electronic+Data+Act&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/09/Legislation.jpg"><img class="aligncenter size-full wp-image-786" title="Legislation" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/09/Legislation.jpg" alt="" width="448" height="298" /></a><br />
The onslaught of significant data breaches in the past year has once again spurred <a rel="”nofollow” nofollow" href="http://www.csoonline.com/article/685125/they-re-baaack-national-data-breach-notification-bills-resurface" target="_blank" class="broken_link">legislators</a> to push for national data breach notification legislation.  Such a cohesive law would replace the jigsaw puzzle of state legislation that has followed in the wake of California’s security breach notification law, or <a rel="”nofollow” nofollow" href="http://en.wikipedia.org/wiki/SB_1386" target="_blank" class="broken_link">S.B. 1386</a>, which was designed to ensure that companies alert customers when they are at risk for identity theft. </p>
<p>But less agreed upon in the rush to protect the public is the question of what qualifies as “risk” to consumers, and exactly when organizations should be mandated to reveal breaches.</p>
<p>Legislation that has been introduced includes the <a rel="”nofollow” nofollow" href="http://www.govtrack.us/congress/bill.xpd?bill=s111-1490" target="_blank" class="broken_link">Personal Data Privacy and Security Act</a>, sponsored by Sen. Patrick Leahy, requiring companies to disclose cyber attacks that jeopardize consumers’ personal information and making it a crime to conceal such a breach.  The bill would also mandate organizations that possess personal information to put in place &#8220;reasonable&#8221; security procedures to keep that data secure.</p>
<p>Other bills that have been introduced include the <a rel="”nofollow” nofollow" href="http://bono.house.gov/News/DocumentSingle.aspx?DocumentID=246029" target="_blank" class="broken_link">Secure and Fortify Electronic Data Act</a>, sponsored by Rep. Mary Bono Mack, which requires notification to the FTC and consumers within 48 hours of the time that a breach has been secured and scope of the breach assessed, at risk of penalties levied by the FTC.</p>
<p>But amidst a growing consensus that a <a href="http://www.experian.com/blogs/data-breach/2011/06/28/is-a-national-data-breach-notification-law-finally-within-reach/" target="_blank">national data breach notification law</a> will make compliance stricter and less cumbersome for businesses while helping to protect consumers, there is concern that the bills afoot pose a danger of over-reporting data breaches, which can be as serious as that of under-reporting. </p>
<p>The Business Software Alliance, for example, believes that over-reporting of data breaches may lead consumers to ignore notifications, leading to the possibility that they won’t make arrangements to protect themselves from the risk of identity and financial theft.  The Alliance argues that Washington should adopt a higher threshold for data breach disclosure than the threat of “reasonable risk” to consumers; instead, the bar for notification should be that of “significant risk.”  Anything less than this will require companies to notify customers when a threat <em>might</em> be posed, which will add to the problem of <a href="http://www.experian.com/blogs/data-breach/2011/05/03/are-we-suffering-from-breach-notification-fatigue/" target="_blank">breach notification fatigue</a> that has some consumers tuning out warnings after they have actually been exposed to a real threat.</p>
<p>Until further breach notification laws have been sorted out at the state and federal level, for now it’s best to keep <a href="http://www.experian.com/blogs/data-breach/2011/05/10/breach-notification-in-three-easy-steps/" target="_blank">best practices</a> about breach notification in mind as your company steels itself from the dangers of cyberspace and strikes the most responsible reporting balance.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/09/20/over-reporting-vs-under-reporting-data-breaches/&via=Experian_DBR&text=Over-reporting vs. under-reporting data breaches&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/09/20/over-reporting-vs-under-reporting-data-breaches/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Are we suffering from breach notification fatigue?</title>
		<link>http://www.experian.com/blogs/data-breach/2011/05/03/are-we-suffering-from-breach-notification-fatigue/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/05/03/are-we-suffering-from-breach-notification-fatigue/#comments</comments>
		<pubDate>Tue, 03 May 2011 15:25:22 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[2011 Data Breaches Investigations Report]]></category>
		<category><![CDATA[breach notification fatigue]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Sony PlayStation breach]]></category>
		<category><![CDATA[Verizon]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=546</guid>
		<description><![CDATA[With numerous different breaches affecting so many people as of late, millions of consumers are receiving emails from trusted brands noting that customer emails (and perhaps other information) have been compromised, so consumers should be wary of future emails that may appear to be sent from them.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F05%2F03%2Fare-we-suffering-from-breach-notification-fatigue%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=2011+Data+Breaches+Investigations+Report,breach+notification+fatigue,Data+Breach+Notification,Phishing,Sony+PlayStation+breach,Verizon&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/05/Phishing1.jpg"></a><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/05/Phishing.jpg"></a></p>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/05/Phishing2.jpg"><img class="aligncenter size-full wp-image-559" title="Phishing" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/05/Phishing2.jpg" alt="" width="480" height="399" /></a></p>
<p>It seems as though every day the news headlines trumpet another high-profile data breach.  The most recent marquee breach is courtesy of a Sony PlayStation Network hacker, whose <a rel="”nofollow” nofollow" href="http://www.reuters.com/article/2011/04/26/us-sony-stoldendata-idUSTRE73P6WB20110426" target="_blank" class="broken_link">attack</a> on the Sony and Qriocity servers between April 17th and 19th have compromised the personal data and, possibly, stored credit card information of 77 million players.  (Yes, you read that right; 77 million.)  Combine that with other recent cyber-heists affecting millions of unsuspecting consumers or residents, and many organizations have been forced to send out a dizzying array of <a href="http://www.experian.com/blogs/data-breach/2011/03/01/get-ready-for-a-new-wave-of-breach-notification-laws/" target="_blank">email notifications</a> to their customer base, many – if not all – of whom are now vulnerable to spear-phishing attacks.</p>
<p>With numerous different breaches affecting so many people as of late, millions of consumers are receiving emails from trusted brands noting that customer emails (and perhaps other information) have been compromised, so consumers should be wary of future emails that may appear to be sent from them…like the one they’re reading now.</p>
<p>Got that?</p>
<p>This begs the question of whether customers are starting to tune out to the onslaught of breach alerts flooding their email in-boxes.</p>
<p>Some security gurus believe that notifications aren’t effective and customers become numb to these alerts.  Others are convinced that breach information overload is a good thing, educating people to the dangers lurking in the cybershadows and their vulnerability to <a href="http://www.experian.com/blogs/data-breach/2011/02/15/10-ways-that-breaches-burn-business/" target="_blank">identity thieves</a>.  After all, how do you know to watch out for email “bait” if you’re not aware there’s a phishing hook with your name on it?</p>
<p>Furthermore, the flip side of over-notification is under-notification.  This is something that Sony is now being accused of in a <a rel="”nofollow” nofollow" href="http://www.pcworld.com/article/226478/sony_sued_over_psn_data_breach_failure_to_disclose.html" target="_blank" class="broken_link">lawsuit</a> that claims the company waited too long to notify its PlayStation customers of the recent breach, which only exacerbated customer vulnerability to credit card fraud.</p>
<p>The irony is that while the dramatic breaches of late have been stealing headlines (as well as data), a <a rel="”nofollow” nofollow" href="http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2011_en_xg.pdf" target="_blank" class="broken_link">2011 Data Breaches Investigations Report by Verizon</a> indicates that total thefts from data breaches have in fact declined significantly over the past few years.  The total number of records actually compromised from these breaches was a “mere” 4 million in 2010, quite a drop from the 144 million records compromised in 2009, and the 361 million compromised records in 2008.  The bad news?  If you look at actual data breaches versus compromised records, the <a rel="”nofollow” nofollow" href="http://blogs.smartmoney.com/paydirt/2011/04/20/cyber-crime-break-ins-are-up-but-theft-is-down/?mod=SMBlog" target="_blank" class="broken_link">numbers this year are up</a>; 760 breaches last year, an increase from 141 in 2009.</p>
<p>The bottom line: while fraudsters haven’t been able to recently score as much cyber-loot as in times past, this is <a rel="”nofollow” nofollow" href="http://www.esecurityplanet.com/news/article.php/3931496/article.htm" target="_blank" class="broken_link">no time to relax</a>.  Just be aware that with the steep increase in breaches comes an equally steep increase in breach notifications, and the associated risk that breach notification fatigue will put your customers to sleep.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/05/03/are-we-suffering-from-breach-notification-fatigue/&via=Experian_DBR&text=Are we suffering from breach notification fatigue?&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/05/03/are-we-suffering-from-breach-notification-fatigue/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>