Tag: Data Breach Notification

Loading...
Stress, Apathy and Winning by Default: How Consumers R...

Data breach notification letters serve multiple purposes. They ensure a breached company is compliant with data breach notification laws, they alert consumers to the breach and their involvement in it, they can warn customers of potential identity theft risks and educate them on how to cope with those risks....

Read More Stress, Apathy and Winning by Default: How Consumers Respond to Data Breach Notification Letters
Views on Consumer Reactions

to Data Breaches...

Q&A with Experian® Data Breach Resolution Vice President, Michael Bruemmer. The Ponemon Institute recently released a survey report—‘‘The Aftermath of a Mega Data Breach: Consumer Sentiment’’—sponsored by Experian Data Breach Resolution. Bloomberg BNA Privacy & Security Law Report Senior Legal Editor Donald G. Aplin posed a series of questions...

Read More Views on Consumer Reactions

to Data Breaches

The Worst Things You can Say or Do in a Breach Notific...

When a data breach occurs, laws and industry regulations, dictate when and if you need to notify consumers whose data might have been compromised. However, many consumers would also probably argue that you’re morally obligated, to notify them of data loss; they want you to tell them of the...

Read More The Worst Things You can Say or Do in a Breach Notification Letter
Data Breach News for the First Quarter of 2014...

With the first quarter of 2014 drawing to a close, now is a good time to review data breach news from the past four months and consider what that information may indicate about the state of cyber security in American businesses. As of March 21, 2014, 191 data breaches...

Read More Data Breach News for the First Quarter of 2014
Must-do Resolutions to Improve Your Small Business’ Cy...

As we approach the end of the 1st quarter of 2014 , small-business owners juggle a host of operational and financial objectives. Resolving to improve cyber security should be paramount among them. Cyber security risks continue to grow across all industries, regardless of an organization’s size. Data shows that...

Read More Must-do Resolutions to Improve Your Small Business’ Cyber Security
Infographic: Security Concerns Cause Pain for Consumer...

This latest study from the Ponemon Institute examines consumer’s sentiment towards security of eHealth Resources. The study finds that attitudes and behaviors towards online activities change, based on consumer’s perceptions and privacy security concerns. Download the study here...

Read More Infographic: Security Concerns Cause Pain for Consumers using eHealth Resources
Medical Data Breaches: A Source of Chronic Pain...

With over 870,000 medical records exposed in data breaches in just the first quarter of 2013, medical data breaches have become a source of chronic pain for healthcare organizations   Adding to this complexity is the HIPAA Omnibus Final Rule.  For additional resources to help you accelerate your healthcare data breach resolution,...

Read More Medical Data Breaches: A Source of Chronic Pain
What’s In Your Data Breach Toolbox?...

Our latest Ponemon Institute study suggests many companies are not adequately prepared to mitigate damages associated with a data breach. If you find your organization represented in the summary-findings below, click the image to download the...

Read More What’s In Your Data Breach Toolbox?
Cyber security: a key topic at 2013 HCCA Conference...

The 17th annual Health Care Compliance Association (HCCA) Compliance Institute Conference took place in National Harbor, MD and was attended by healthcare personnel and data protection and security professionals.  Key topics covered in various panels related to cyber security issues including medical identity theft, data breaches and patient health...

Read More Cyber security: a key topic at 2013 HCCA Conference
Tips to save your reputation following a big data brea...

The advent of big data and consequently, the task of collecting and analyzing it, can reap many benefits for organizations looking for deeper insight. We create 2.5 quintillion bytes of data daily1 in all aspects of everyday life.  Organizations can use this data to increase productivity, provide more value...

Read More Tips to save your reputation following a big data breach
Secure your outsourcing practices to prevent data brea...

Outsourcing can be risky business. The Ponemon Institute reports that 65% of companies who outsourced work to a vendor have had a data breach involving consumer data and 64% say it has happened more than once.  Their study, Securing Outsourced Consumer Data, sponsored by Experian® Data Breach Resolution also...

Read More Secure your outsourcing practices to prevent data breaches
Cyber Security Act of 2012 dies as an executive order ...

The flickering hope that Congress would pass the Cyber Security Act of 2012 which addressed issues of national cyber security during its current lame duck session has been extinguished as the bill failed in a 51-47 vote.  (In order to pass, the bill needed 60 votes.)  The Defense Department...

Read More Cyber Security Act of 2012 dies as an executive order is born