<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; Compliance</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/tag/compliance/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>What does increased enforcement mean to you?</title>
		<link>http://www.experian.com/blogs/data-breach/2012/09/18/what-does-increased-enforcement-mean-to-you/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/09/18/what-does-increased-enforcement-mean-to-you/#comments</comments>
		<pubDate>Tue, 18 Sep 2012 17:33:11 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Fraud]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1618</guid>
		<description><![CDATA[&#160; Health care fraud and abuse has been in the national spotlight for years. But now that the Affordable Care Act is coming into play, it’s taking center stage. The Affordable Care Act gives officials tough tools to crack down on groups and individuals who try to defraud Medicare, Medicaid and other types of insurance [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F09%2F18%2Fwhat-does-increased-enforcement-mean-to-you%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Compliance,Fraud&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>&nbsp;</p>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/09/healthcare-fraud-image.jpg"><img class="aligncenter  wp-image-1627" title="Healthcare costs" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/09/healthcare-fraud-image.jpg" alt="" width="458" height="305" /></a></p>
<p>Health care fraud and abuse has been in the national spotlight for years. But now that the Affordable Care Act is coming into play, it’s taking center stage.</p>
<p>The Affordable Care Act gives officials tough tools to crack down on groups and individuals who try to defraud Medicare, Medicaid and other types of insurance plans. These tools include technology that’s being used to spot fraud and suspicious activity before any claims are paid.</p>
<p>The law is also creating partnerships between government agencies and private organizations that are working together to fight fraud and health care abuse. One of the more visible examples of this increased collaboration is the Health Care Fraud Prevention and Enforcement Action Team or “HEAT,” which is a joint effort between the U.S. Department of Health and Human Services and the Department of Justice. </p>
<p>So where do you fit into this battle against health care fraud? What defense counsel advice could you give your clients in this era of increased enforcement?</p>
<p>Join us at the Fraud &amp; Compliance Forum to find out. Experian will be one of the exhibitors at the conference, which will be held Sept. 30-0ct. 2, in Baltimore, MD. The forum is sponsored by the American Health Lawyers Association (AHLA) and the Health Care Compliance Association (HCCA).  It will feature speakers from the Inspector General’s Office, Department of Justice and Centers for Medicare and Medicaid Services, along with private practitioners.</p>
<p>In addition to discussing increased enforcement, there will also be sessions on some of the following topics:</p>
<ul>
<li>50 Shades of Gray: Strategies for hospital-physician alignment in the light of recent developments</li>
<li>CIAs: What enhanced Corporate Integrity Obligations tell us about OIG expectations for compliance programs</li>
<li>Compliance, criminal and civil liability for overpayments</li>
<li>Strategies for a medical necessity case</li>
<li>Exit strategies for voluntary disclosures</li>
</ul>
<p>For more information, call HCCA at 888-580-8373 or visit <a href="http://www.healthlawyers.org/Events/Programs/2012/Pages/FC12.aspx" class="broken_link" rel="nofollow">http://www.healthlawyers.org/Events/Programs/2012/Pages/FC12.aspx</a></p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/09/18/what-does-increased-enforcement-mean-to-you/&via=Experian_DBR&text=What does increased enforcement mean to you?&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F09%2F18%2Fwhat-does-increased-enforcement-mean-to-you%2F&amp;title=What%20does%20increased%20enforcement%20mean%20to%20you%3F" id="wpa2a_2"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/09/18/what-does-increased-enforcement-mean-to-you/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Responding resourcefully to medical data breaches</title>
		<link>http://www.experian.com/blogs/data-breach/2012/04/26/responding-resourcefully-to-medical-data-breaches/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/04/26/responding-resourcefully-to-medical-data-breaches/#comments</comments>
		<pubDate>Thu, 26 Apr 2012 22:58:01 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[PHI]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1153</guid>
		<description><![CDATA[&#160; It’s safe to say that healthcare data is/are under attack. Breaches of medical records increased 97% from 2010 to 2011 according to HHS data. Statistics like that lend new urgency and importance to gatherings such as the upcoming HCCA 2012 Compliance Institute. Be prepared: Does your organization observe security protocols and have controls in [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F04%2F26%2Fresponding-resourcefully-to-medical-data-breaches%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Compliance,Data+Breach+Notification,healthcare,HIPAA,PHI&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>&nbsp;</p>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/04/patient-data-breaches1.jpg"><img class="aligncenter size-full wp-image-1166" title="patient-data-breaches" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/04/patient-data-breaches1.jpg" alt="" width="400" height="300" /></a></p>
<p>It’s safe to say that healthcare data is/are under attack. Breaches of <a title="Differentiating factors of a healthcare breach" href="http://www.experian.com/blogs/data-breach/2012/04/10/5-differentiating-factors-of-a-healthcare-breach/">medical records increased 97% </a>from 2010 to 2011 according to HHS data. Statistics like that lend new urgency and importance to gatherings such as the upcoming HCCA 2012 Compliance Institute.</p>
<p><strong>Be prepared:</strong> Does your organization observe security protocols and have controls in place to protect patient health information (PHI)?</p>
<p><strong>Have a response plan ready to deploy:</strong> In the event of a data breach, the first thing to do is activate your <a title="Data breach response plan" href="http://www.experian.com/blogs/data-breach/2011/02/22/develop-a-breach-response-plan-now-to-be-ready-to-efficiently-address-a-breach-as-soon-as-it-is-reported/">response plan</a>. In general, this plan spells out in great detail everything from who will lead the response team to step-by-step processes for sending out notifications, customer care and more.</p>
<p><strong>Evaluate your situation post-breach:</strong> Once you’ve weathered the storm of a data breach and its consequences, take time to review the ways your organization responded and grade your response plan. This is also the time to make changes, small and substantial, to the response plan and implement any other protections or processes that you feel would improve your readiness and ability to respond in the event of another incident.</p>
<p>Look for Experian at the 2012 Compliance Institute in Las Vegas from April 29 to May 1. It’s a great opportunity to immerse yourself in solutions for preventing and managing data breaches, as well as meet experts who can help your organization be better prepared in the event of an incident.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Ponemon Third Annual Medical Identity Theft Study" href="http://www.experian.com/innovation/business-resources/ponemon-third-annual-medical-id-theft-study.jsp?WT.srch=ecd_dbres_blog_042612_article">Download the Ponemon Medical Identity Theft Study to learn the costly consequences facing patients and providers</a>.</div></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/04/26/responding-resourcefully-to-medical-data-breaches/&via=Experian_DBR&text=Responding resourcefully to medical data breaches&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F04%2F26%2Fresponding-resourcefully-to-medical-data-breaches%2F&amp;title=Responding%20resourcefully%20to%20medical%20data%20breaches" id="wpa2a_4"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/04/26/responding-resourcefully-to-medical-data-breaches/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The danger of not having a breach policy in place</title>
		<link>http://www.experian.com/blogs/data-breach/2010/12/01/the-danger-of-not-having-a-breach-policy-in-place/</link>
		<comments>http://www.experian.com/blogs/data-breach/2010/12/01/the-danger-of-not-having-a-breach-policy-in-place/#comments</comments>
		<pubDate>Wed, 01 Dec 2010 17:01:12 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[Trend Micro]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=223</guid>
		<description><![CDATA[A recent study by Trend Micro indicates data loss is a growing concern for small businesses. The 2010 Corporate End User Study found that close to 60% of business respondents feared that data loss would be the result of data-stealing malware or by intentional or unintentional data leaks outside the company network.  Even though data [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2010%2F12%2F01%2Fthe-danger-of-not-having-a-breach-policy-in-place%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Compliance,Cyber+Security,Data+Breach,Data+Security,PII,Trend+Micro&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>A <span style="text-decoration: underline;"><a href="http://www.infosecurity-us.com/view/13786/data-loss-is-a-growing-concern-of-small-businesses/" target="_blank" class="broken_link" rel="nofollow">recent study</a></span> by Trend Micro indicates data loss is a growing concern for small businesses. The <span style="text-decoration: underline;"><a href="http://trendmicro.mediaroom.com/index.php?s=23" target="_blank" class="broken_link" rel="nofollow">2010 Corporate End User Study</a></span> found that close to 60% of business respondents feared that data loss would be the result of data-stealing malware or by intentional or unintentional data leaks outside the company network.  Even though data loss is a big concern, a majority of the surveyed small businesses indicated that they did not have data loss policies or loss prevention education in place.</p>
<p>The lack of data loss policy creates risk for both the small business and the customer.  As I mentioned <a href="http://" target="_blank"><span style="text-decoration: underline;">earlier</span></a>, a breach may result in reduced customer trust, lost revenue and substantial costs associated with resolving the crisis.  If a small business has limited cash flows, addressing a breach may be what drives the business to close.</p>
<p>Additionally, new data security and notification <span style="text-decoration: underline;">legislation</span> has been introduced to Congress. The legislation proposes that all businesses that handle personally identifiable information (PII) be required to implement security policies and procedures to protect this information and provide notice in the event of a <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">data breach</a>.  Businesses that do not comply would face substantial penalties.</p>
<p><span style="text-decoration: underline;"><a href="http://content.usatoday.net/dist/custom/gci/InsidePage.aspx?cId=jconline&amp;sParam=34911021.story" target="_blank" class="broken_link" rel="nofollow">Recent news</a></span> indicates the government’s current interest to levy fines against companies that do not follow current law.  The Indiana attorney general’s office is suing health insurer WellPoint for waiting several months before notifying customers of a data breach.</p>
<p>The best approach to avoid violating these new laws is to be proactive. Get a data breach resolution plan in place…<strong><span style="text-decoration: underline;">before</span></strong> a breach occurs.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2010/12/01/the-danger-of-not-having-a-breach-policy-in-place/&via=Experian_DBR&text=The danger of not having a breach policy in place&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2010%2F12%2F01%2Fthe-danger-of-not-having-a-breach-policy-in-place%2F&amp;title=The%20danger%20of%20not%20having%20a%20breach%20policy%20in%20place" id="wpa2a_6"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2010/12/01/the-danger-of-not-having-a-breach-policy-in-place/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Do you know the real threat to your customer data?</title>
		<link>http://www.experian.com/blogs/data-breach/2010/09/07/do-you-know-the-real-threat-to-your-customer-data/</link>
		<comments>http://www.experian.com/blogs/data-breach/2010/09/07/do-you-know-the-real-threat-to-your-customer-data/#comments</comments>
		<pubDate>Tue, 07 Sep 2010 23:03:11 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Fraud Resolution]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[Verizon]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=30</guid>
		<description><![CDATA[A big fear of business leaders and privacy professionals alike is the accidental breach of customer personally identifiable information (PII) either through the loss or destruction of company property, such as a laptop, by an employee. However, the 2010 Verizon Data Breach Investigations report points to a different data privacy threat that is farther reaching than that of a laptop left on a plane.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2010%2F09%2F07%2Fdo-you-know-the-real-threat-to-your-customer-data%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Compliance,Cyber+Security,Data+Breach,Data+Security,PII,Verizon&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2010/09/iStock_000011690232Small.jpg" target="_blank"><img class="size-full wp-image-23 alignnone" title="iStock_000011690232Small" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2010/09/iStock_000011690232Small.jpg" alt="" width="540" height="270" /></a></p>
<p>A big fear of business leaders and privacy professionals alike is the accidental breach of customer personally identifiable information (PII) either through the loss or destruction of company property, such as a laptop, by an employee.</p>
<p>However, the 2010 Verizon Data Breach Investigations <a href="http://www.verizonbusiness.com/resources/reports/rp_2010-data-breach-report_en_xg.pdf" target="_blank" class="broken_link" rel="nofollow"><span style="text-decoration: underline;">report</span> </a>points to a different data privacy threat that is farther reaching than that of a laptop left on a plane.  The report indicates that organized crime is responsible for 85% of all stolen data in 2009. Cyber-criminals were able to take advantage of login credentials on nearly 40% of the data stolen to potentially inflict credit or financial damages on individuals. However, the study points to 98% of the ensuing data breaches being avoidable through simple controls that were not in place. <span style="text-decoration: underline;"><a href="http://news.cnet.com/8301-27080_3-20011871-245.html" target="_blank" class="broken_link" rel="nofollow">Read more</a></span> about this report on CNET.</p>
<p>Does this study indicate that companies are not doing enough to protect their customer data?  According to a <span style="text-decoration: underline;"><a href="http://www.ponemon.org/local/upload/fckjail/generalcontent/18/file/Electronic%20Health%20Information%20at%20Risk%20FINAL%201.pdf" target="_blank" class="broken_link" rel="nofollow">2009 Ponemon study</a></span>, 70% of IT professionals in the healthcare field, for example, believe that senior management does not view privacy and <a href="http://www.experian.com/data-breach/cyber-security.html" target="_blank">data security </a>as a top priority. The study also shows that over 60% of IT professionals surveyed believe they do not have enough resources to ensure data security requirements are met.</p>
<p>All too often security is not discussed until a <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">data breach</a> takes place. A breach may result in reduced customer trust, lost revenue and substantial costs associated with resolving the crisis.  It may be time to start the internal conversation to ensure the right systems are in place to protect customer data…before it’s too late.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2010/09/07/do-you-know-the-real-threat-to-your-customer-data/&via=Experian_DBR&text=Do you know the real threat to your customer data?&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2010/09/07/do-you-know-the-real-threat-to-your-customer-data/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Does your company have a wireless device data policy in place?</title>
		<link>http://www.experian.com/blogs/data-breach/2010/09/07/does-your-company-have-a-wireless-device-data-policy-in-place/</link>
		<comments>http://www.experian.com/blogs/data-breach/2010/09/07/does-your-company-have-a-wireless-device-data-policy-in-place/#comments</comments>
		<pubDate>Tue, 07 Sep 2010 21:12:50 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Policy]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[iPad]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[standards]]></category>
		<category><![CDATA[wireless device]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=24</guid>
		<description><![CDATA[As more business users work remotely and travel the use of wireless devices has become a necessity in the workplace to access data. However, using wireless devices presents new challenges to keep transmitted and stored data secure. ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2010%2F09%2F07%2Fdoes-your-company-have-a-wireless-device-data-policy-in-place%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Compliance,Cyber+Security,Data+Breach,Data+Policy,Data+Security,iPad,PII,standards,wireless+device&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2010/09/iPad3.jpg" target="_blank"><img class="size-full wp-image-39 alignnone" title="iPad3" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2010/09/iPad3.jpg" alt="" width="530" height="270" /></a></p>
<p>Smart phones and other wireless devices are increasingly popular among individual and business users with a 64% year over year market share growth, according to <a href="http://canalys.com/pr/2010/r2010081.html" target="_blank" class="broken_link" rel="nofollow">Canalys</a>.  As more business users work remotely and travel the use of wireless devices has become a necessity in the workplace to access data. However, using wireless devices presents new challenges to keep transmitted and stored data secure.</p>
<p>Earlier this year, it was<a href="http://" target="_blank"> reported</a> that several senior level Washington DC politicians purchased <a href="http://" target="_blank">iPads</a> and individually set up their wireless accounts using their service provider’s account verification process.  A security company identified a <a href="http://security.goatse.fr/" target="_blank" class="broken_link" rel="nofollow">data security flaw</a> and was able to hack the verification process.  This clever hack resulted in the theft of over 100,000 email addresses and unique numbers associated with the devices purchased.  Affected politicians included White House Chief of Staff, Rahm Emanuel and New York City Mayor, Michael Bloomberg.</p>
<p>Individual email addresses and device serial numbers may not sound significant at first glance.  However, nefarious individuals can leverage this data to guess more relevant information such as provider account number&#8230;which is linked to personally identifiable information (PII) of the end user.</p>
<p>Defining wireless device use standards is paramount. Corporate executive leadership must enable the communication between leaders in the Compliance, IT and consumer- facing teams to develop standards for device adoption and for how sensitive data is handled or distributed.  Policies and standards must be in place to help prevent the occurrence of a <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">data breach</a>.</p>
<p>What is your company doing to define wireless device usage and data standards?</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2010/09/07/does-your-company-have-a-wireless-device-data-policy-in-place/&via=Experian_DBR&text=Does your company have a wireless device data policy in place?&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2010/09/07/does-your-company-have-a-wireless-device-data-policy-in-place/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>