<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; data breach fines</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/tag/data-breach-fines/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>Law vs. Technology: Which stops more breaches?</title>
		<link>http://www.experian.com/blogs/data-breach/2011/06/07/law-vs-technology-which-stops-more-breaches/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/06/07/law-vs-technology-which-stops-more-breaches/#comments</comments>
		<pubDate>Tue, 07 Jun 2011 18:05:25 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[data breach fines]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[Federal Trade Commission]]></category>
		<category><![CDATA[Identity Ecosystem]]></category>
		<category><![CDATA[national data breach law]]></category>
		<category><![CDATA[National Strategy for Trusted Identities in Cyberspace]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=597</guid>
		<description><![CDATA[With the recent rash of highly newsworthy data breaches, headlined by the Sony PlayStation Network breach that impacted 77+ million subscribers, there’s been much hand-wringing over how to best ensure the protection of customer privacy.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F06%2F07%2Flaw-vs-technology-which-stops-more-breaches%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach,data+breach+fines,Data+Breach+Notification,Federal+Trade+Commission,Identity+Ecosystem,national+data+breach+law,National+Strategy+for+Trusted+Identities+in+Cyberspace&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/06/i_haymarket_net_au_features_justice1.jpg"><img class="size-full wp-image-603 alignnone" title="i_haymarket_net_au_features_justice1" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/06/i_haymarket_net_au_features_justice1.jpg" alt="" width="336" height="336" /></a></p>
<p>With the recent rash of highly newsworthy data breaches, headlined by the <a rel="”nofollow” nofollow" href="http://www.businessweek.com/news/2011-05-03/sony-data-breach-exposes-users-to-years-of-identity-theft-risk.html" target="_blank" class="broken_link">Sony PlayStation Network breach</a> that impacted 77+ million subscribers, there’s been much hand-wringing over how to best ensure the protection of customer privacy.  <a rel="”nofollow” nofollow" href="http://blogs.forbes.com/kashmirhill/2011/05/09/how-do-we-deal-with-data-breaches/" target="_blank" class="broken_link">The debate</a> seems to be centered around two different camps: those who believe that the force of law can best bolster security and those who argue that better technology holds the key to data breach freedom.</p>
<p><span style="text-decoration: underline;">Camp #1: The Lawyers</span></p>
<p>While proposals for a <a rel="”nofollow” nofollow" href="http://www.govtrack.us/congress/bill.xpd?bill=h111-2221" target="_blank" class="broken_link">national data breach law</a> have so far failed to gain traction, most states now have laws in place that oblige companies to take certain steps when data breaches impact their customers, including requirements around <a href="http://www.experian.com/blogs/data-breach/2011/03/01/get-ready-for-a-new-wave-of-breach-notification-laws/" target="_blank">breach notification</a>.  Privacy advocates insist that the government needs to become more involved in serving as a national “<a rel="”nofollow” nofollow" href="http://www.nytimes.com/2011/05/08/weekinreview/08bilton.html" target="_blank" class="broken_link">data sheriff</a>,” passing new laws that will force companies to take their security obligations more seriously.  In the meantime, as we <a href="http://www.experian.com/blogs/data-breach/2011/05/31/the-high-cost-of-data-breaches-just-got-higher/" target="_blank">reported recently</a>, the Sony breach in particular has galvanized the Federal Trade Commission to begin levying fines against companies for insufficient security practices that allow data breaches to take place.  The argument for financial penalties against breached companies is that economic spankings will motivate organizations to plug security holes in ways that concern for consumer protection alone has not.</p>
<p><span style="text-decoration: underline;">Camp #2: The Techies </span></p>
<p>While legal roadblocks may have their place, some believe that regulations can only go so far in protecting us.  Factors that make information control nigh impossible, according to <a rel="”nofollow” nofollow" href="http://techland.time.com/2011/05/08/why-your-personal-information-wants-to-be-free/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+timeblogs%2Fnerd_world+%28TIME%3A+Techland%29" target="_blank" class="broken_link">Time</a>’s Jerry Brito, include the proliferation of digitization, the vast scope of the Internet, the scale of communications made possible by the Internet, and the ease of online distribution.  Instead of punitive measures as a path to security, this argument goes, we should accept that data breaches are inevitable and instead focus on harnessing technology to improve security.  Proponents of this approach note, for example, the promise of the Obama Administration’s <a rel="”nofollow” nofollow" href="http://www.nist.gov/nstic/" target="_blank" class="broken_link">National Strategy for Trusted Identities in Cyberspace</a>, which would establish an <a rel="”nofollow” nofollow" href="http://www.nist.gov/nstic/identity-ecosystem.html" target="_blank" class="broken_link">identity ecosystem</a> that would utilize new technologies, policies and standards to help protect and authenticate consumer transactions.</p>
<p>As data breaches become bolder and more destructive, the debate about how to best protect ourselves from this online menace is sure to rage on.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/06/07/law-vs-technology-which-stops-more-breaches/&via=Experian_DBR&text=Law vs. Technology: Which stops more breaches?&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/06/07/law-vs-technology-which-stops-more-breaches/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The high cost of data breaches just got higher</title>
		<link>http://www.experian.com/blogs/data-breach/2011/05/31/the-high-cost-of-data-breaches-just-got-higher/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/05/31/the-high-cost-of-data-breaches-just-got-higher/#comments</comments>
		<pubDate>Tue, 31 May 2011 15:44:22 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[data breach fines]]></category>
		<category><![CDATA[Federal Trade Commission]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=583</guid>
		<description><![CDATA[In an effort to make data breaches even more unpalatable and motivate companies to strengthen their security practices, the Federal Trade Commission is beginning to levy punishments for security holes that invite intrusions.  ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F05%2F31%2Fthe-high-cost-of-data-breaches-just-got-higher%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach,data+breach+fines,Federal+Trade+Commission&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/05/img_0615-7-deadly-sins-2_thumb555.jpg"></a></p>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/05/img_0615-7-deadly-sins-2_thumb5551.jpg"><img class="aligncenter size-full wp-image-588" title="img_0615-7-deadly-sins-2_thumb555" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/05/img_0615-7-deadly-sins-2_thumb5551.jpg" alt="" width="429" height="336" /></a></p>
<p>If you thought that <a href="http://www.experian.com/blogs/data-breach/2011/02/15/10-ways-that-breaches-burn-business/" target="_blank">data breaches were already expensive</a> – what with the manpower and resources needed to issue breach notifications, offer compensatory protection services such as free identity theft protection, identify the source of leaks and tighten up security, and bolster marketing efforts to hang on to customer loyalty – add a new line item to the list.</p>
<p>Fines.</p>
<p>In an effort to make data breaches even more unpalatable and motivate companies to <a href="http://www.experian.com/business-services/data-breach-protection.html" target="_blank">strengthen their security practices</a>, the Federal Trade Commission is beginning to levy punishments for security holes that invite intrusions.  For example, the <a rel="”nofollow” nofollow" href="http://www.pcworld.com/businesscenter/article/226978/ftc_settles_data_breach_charges_against_two_firms.html" target="_blank" class="broken_link">FTC recently settled</a> with two companies, a payroll and HR firm and an immigration law services firm, both of which maintain a great deal of sensitive information about the employees of their business customers, including Social Security numbers.  The organizations were charged with violating federal law by failing to provide reasonable and appropriate measures to protect sensitive data, in spite of the fact that the companies advertised their security measures with claims such as “worry-free safety and reliability.”  As part of the settlements, each firm is required to obtain comprehensive information security programs and independent security audits every other year for 20 years.</p>
<p>Taking a cue from this new practice in the U.S. and other countries, and asserting her deep concern with the large number of recent breaches, <a rel="”nofollow” nofollow" href="http://www.cbc.ca/news/technology/story/2011/05/04/technology-data-breaches-stoddart.html" target="_blank" class="broken_link">Canada’s privacy commissioner</a> also wants to start implementing hefty “attention-getting fines” against firms that have allowed customer data to be compromised through preventable data breaches.</p>
<p>This decision followed news that Canadian lawyers have announced a $1 billion class-action lawsuit as a response to two massive Sony PlayStation Network breaches that exposed the information of 102 million customers.  A <a rel="”nofollow” nofollow" href="http://ingame.msnbc.msn.com/_news/2011/05/03/6577819-sony-declines-to-testify-before-congress-as-1-billion-lawsuit-filed" target="_blank" class="broken_link">U.S. House of Representatives subcommittee</a> is also demanding answers from Sony about the circumstances surrounding these breaches and has scheduled a hearing to address the “threat of data theft to American customers.”</p>
<p>Not all security experts think that punitive measures towards breached organizations help protect customers from data theft, noting that it is akin to fining a store after it has been robbed.  In fact, <a rel="”nofollow” nofollow" href="http://www.networkworld.com/news/2011/042211-data-breach-fines-can-risk.html?page=1" target="_blank" class="broken_link">some think that fines have the opposite effect</a> by deterring companies from reporting data breach incidents in the first place.</p>
<p>As they say, the best defense is a good offense.  Protect your organization from the threat of breaches and expensive regulatory punishments by ensuring that you have a strong and <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">defensible security program</a> in place.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/05/31/the-high-cost-of-data-breaches-just-got-higher/&via=Experian_DBR&text=The high cost of data breaches just got higher&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/05/31/the-high-cost-of-data-breaches-just-got-higher/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>