<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; Data Breach Notification</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/tag/data-breach-notification/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>7 Things you should think about when you audit your response plan</title>
		<link>http://www.experian.com/blogs/data-breach/2012/12/13/7-things-you-should-think-about-when-you-audit-your-response-plan/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/12/13/7-things-you-should-think-about-when-you-audit-your-response-plan/#comments</comments>
		<pubDate>Thu, 13 Dec 2012 17:30:03 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Data Security]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1874</guid>
		<description><![CDATA[Now that your data breach response plan is in place and you’re confident that your company is safeguarded from malicious  data breach attempts, what can possibly be still the biggest threat to your data breach protection plan?  Answer: the plan itself. All the planning and preparation in the world won’t protect your business from a [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F12%2F13%2F7-things-you-should-think-about-when-you-audit-your-response-plan%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Cyber+Security,Data+Breach,Data+Breach+Notification,data+breach+response,data+privacy,Data+Security&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/12/response-plan-checklist.jpg"><img class="aligncenter  wp-image-1875" title="response-plan-checklist" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/12/response-plan-checklist.jpg" alt="" width="509" height="339" /></a></p>
<p>Now that your <a href="http://www.experian.com/blogs/data-breach/2012/03/12/unlock-data-breach-facts/">data breach</a> response plan is in place and you’re confident that your company is safeguarded from malicious <a href="http://www.experian.com/blogs/data-breach/2012/05/07/itrc-report-identifies-top-three-data-breach-triggers/"> data breach</a> attempts, what can possibly be still the biggest threat to your <a href="http://www.experian.com/blogs/data-breach/2012/02/21/when-data-recovery-becomes-a-data-disaster/">data breach protection</a> plan?  Answer: the plan itself. All the planning and preparation in the world won’t protect your business from a data breach if the response plan fails to work.  The business world is ever changing so it’s necessary to ensure that your response plan stays current and functional.</p>
<p>That is why it’s imperative that you regularly audit, test and update your plan on preferably, a quarterly basis.</p>
<p>Here are 7 checklist items to keep in mind when auditing your response plan:</p>
<p>1) Update your data breach response team contact list &#8211; Employees come and go therefore it’s important that the contact information for the members of your internal and external breach response team is current.  Make sure department heads are noted and once updated, re-distribute the list to the appropriate people.</p>
<p>2) Verify that your data breach response plan is comprehensive &#8211; Revise the plan to include any major company changes, such as new departments or adjustments in data management policies.  Check in with each response team member to ensure their department understands its role and what they need to do during a data breach.  Set up a mock <strong>breach of data</strong> scenario so that your response team can practice trial runs. Practice a full scale rehearsal annually so the plan is fully vetted and any adjustments can be made before an event occurs.</p>
<p>3) Double check your vendor contracts – Check that your contracts with your forensics firm, data breach resolution provider and other vendors are current and easily accessible.  Review your vendors and contracts and make sure they both still match your data protection and security needs.</p>
<p>4) Review notification guidelines – Verify that the data breach notification section of your response plan reflects the latest state legislation and that your notification letter templates address any new laws.  Ensureyour contact list of attorneys, government agencies and media is updated so you can easily notify them after a breach.  For medical data breaches, healthcare providers need to verify that Department of Health &amp; Human Services contacts are updated and their response team understands data breach information reporting procedures.</p>
<p>5) Check up on third parties that have access to your data &#8211; Evaluate how third parties are managing your data and if they are following your data protection rules.  Educate them on any new legislation that may affect you during a data breach.  Stress to third parties the importance of reporting a data breach to you immediately and what is expected in the resolution process. Healthcare companies need to meet HIPAA requirements and should check that business associate agreements (BAAs) are established.</p>
<p>6) Evaluate IT Security &#8211; Ensure proper data access controls are in place. Check that automated software and operating system updates for the entire company are installed properly. Verify that any automated security monitoring and reporting system is up to date and working.  Store backup copies of data securely.</p>
<p>7) Review staff security awareness – Verify that your staff is up to date on company policy regarding data security procedures, including what digital and paper documents to keep and how to securely discard what is not needed.  Train staffto identify signs of cyber security threats in their daily work life and know the proper course of action in reporting a breach.  Check that employees are keeping their work related laptops, mobile and digital devices secure at all times and remind them to change passwords every three months.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/12/13/7-things-you-should-think-about-when-you-audit-your-response-plan/&via=Experian_DBR&text=7 Things you should think about when you audit your response plan&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F12%2F13%2F7-things-you-should-think-about-when-you-audit-your-response-plan%2F&amp;title=7%20Things%20you%20should%20think%20about%20when%20you%20audit%20your%20response%20plan" id="wpa2a_2"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/12/13/7-things-you-should-think-about-when-you-audit-your-response-plan/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Federal breach notice: A view worth the climb?</title>
		<link>http://www.experian.com/blogs/data-breach/2012/10/16/federal-breach-notice-a-view-worth-the-climb/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/10/16/federal-breach-notice-a-view-worth-the-climb/#comments</comments>
		<pubDate>Tue, 16 Oct 2012 20:09:05 +0000</pubDate>
		<dc:creator>gredmon</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[National Cyber Security Awareness Month]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1669</guid>
		<description><![CDATA[Working for a company that navigates 46 different state breach notice laws and a plethora of sector based federal breach notice laws, I’m often asked what I think the likelihood is that the Federal Government will pass a comprehensive data breach notification law that supersedes all the state laws. ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F10%2F16%2Ffederal-breach-notice-a-view-worth-the-climb%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Data+Breach,Data+Breach+Notification,data+breach+response,Data+Security,National+Cyber+Security+Awareness+Month&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><em><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/10/federal-breach-notice_a-view-worth-the-climb.jpg"><img class="aligncenter  wp-image-1673" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/10/federal-breach-notice_a-view-worth-the-climb.jpg" alt="" width="441" height="441" /></a></em></p>
<p>&nbsp;</p>
<p><em>Our guest blogger this week is Gant Redmon, General Counsel &amp; Vice President of Business Development at Co3 Systems.</em></p>
<p>Working for a company that navigates 46 different state breach notice laws and a plethora of sector based federal breach notice laws, I’m often asked what I think the likelihood is that the Federal Government will pass a comprehensive data breach notification law that supersedes all the state laws. While I don’t rule out a federal law passing at some point, I see it setting a floor of breach response responsibility rather than superseding everything already in place.</p>
<p>Put yourself in the shoes of a legislator trying to harmonize all the different state laws. That legislator is going to have three big political challenges.</p>
<p>The first challenge is choosing a single standard in the face of wildly different state standards. How will affected states feel about the Federal government imposing a different standard than the one they’ve settled on? Changing the rules in dozens of states will cause upheaval with political fallout.</p>
<p>The second challenge will be dealing with state attorneys general and treasurers. State AG’s are becoming more and more active in tracking breaches and cracking down on companies that don’t provide proper notice or have adequate security procedures. Part of that crackdown includes fines collected that go to the state treasury. A federal law will strip those AGs of the rule of privacy protectors and redirect funds to the federal government and away from the states.</p>
<p>The third challenge is that some states, like California and Virginia, go above even Federal notice requirements. What legislator wants to be known as the one who diluted people’s privacy rights by pre-empting strong protections and replacing them with weaker ones?</p>
<p>When trying to solve a problem, the first thing I ask is if I’m dealing with a problem worth solving. Privacy professionals and law firms have become well versed in the different state laws. Software solutions also exist that track all the different laws and provide incident response plans that are easy to follow. If the problem here is the complexity involved in dealing with disparate state breach notice laws, then we don’t have a problem worth solving.</p>
<p><em>“The opinions reflected in this article are solely those of the author and do not reflect the views of Experian Data Breach Resolution or any of its sister companies.”</em></p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/10/16/federal-breach-notice-a-view-worth-the-climb/&via=Experian_DBR&text=Federal breach notice: A view worth the climb?&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/10/16/federal-breach-notice-a-view-worth-the-climb/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Connecticut gets serious about breach reporting</title>
		<link>http://www.experian.com/blogs/data-breach/2012/10/02/connecticut-gets-serious-about-breach-reporting/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/10/02/connecticut-gets-serious-about-breach-reporting/#comments</comments>
		<pubDate>Tue, 02 Oct 2012 15:03:48 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[National Cyber Security Awareness Month]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1650</guid>
		<description><![CDATA[Get ready, Connecticut. A new data breach law is now in effect that brings the Office of the Attorney General (OAG) into the reporting loop. The new law requires notifying the OAG by email no later than when affected consumers are notified. Previously, businesses were only required to report a breach to consumers. Yet Attorney [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F10%2F02%2Fconnecticut-gets-serious-about-breach-reporting%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach,Data+Breach+Notification,data+breach+response,National+Cyber+Security+Awareness+Month&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/10/connecticut-gets-serious-about-breach-reporting.png"><img class="aligncenter  wp-image-1653" title="connecticut-gets-serious-about-breach-reporting" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/10/connecticut-gets-serious-about-breach-reporting.png" alt="" width="547" height="318" /></a></p>
<p>Get ready, Connecticut. A new data breach law is now in effect that brings the Office of the Attorney General (OAG) into the reporting loop.</p>
<p>The new law requires notifying the OAG by email no later than when affected consumers are notified. Previously, businesses were only required to report a breach to consumers. Yet Attorney General George Jepsen and his office were tasked with enforcing state breach laws – hard to do when you don’t know about the incidents.</p>
<p>But that’s all changed. Assistant Attorney General Matthew Fitzsimmons and the office’s Privacy Task Force will monitor the incoming emails. The new reporting requirement and newish task force (it was created last year) give the OAG more oversight of breach activity that may be putting consumers at risk. With more oversight comes better enforcement – at least that’s certainly what the OAG hopes.</p>
<p>Connecticut requires consumer notification when a breach involves unencrypted, computerized personal data. The state’s definition of “personal data” includes someone’s first and last names in combination with at least one of three data types: a Social Security number; a driver’s license or state identification number; or a financial account number, such as a credit card number, along with the access code for the account.</p>
<p>Businesses that don’t comply with the new law may find themselves in violation of the state’s Fair Trade Practices Act. Remember that sooner is better than later when it comes to breach reporting. At least if you want to avoid fines and violations.</p>
<p>Here’s the new email address for reporting breaches in Connecticut: <a href="mailto:ag.breach@ct.gov">ag.breach@ct.gov</a>.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"> <a href="http://www.experian.com/innovation/business-resources/ponemon-notification-study.jsp?WT.srch=ecd_dbres_blog_100212_article">Download the Ponemon Notification Study to find out what kind of notification letters your customers want &#8211; and why it&#8217;s important to deliver.</a> </div></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/10/02/connecticut-gets-serious-about-breach-reporting/&via=Experian_DBR&text=Connecticut gets serious about breach reporting&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F10%2F02%2Fconnecticut-gets-serious-about-breach-reporting%2F&amp;title=Connecticut%20gets%20serious%20about%20breach%20reporting" id="wpa2a_4"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/10/02/connecticut-gets-serious-about-breach-reporting/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>U.S. beats Germany, U.K. and France when it comes to data breach notification costs, but why?</title>
		<link>http://www.experian.com/blogs/data-breach/2012/08/28/u-s-beats-germany-u-k-and-france-when-it-comes-to-data-breach-notification-but-why/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/08/28/u-s-beats-germany-u-k-and-france-when-it-comes-to-data-breach-notification-but-why/#comments</comments>
		<pubDate>Tue, 28 Aug 2012 20:29:00 +0000</pubDate>
		<dc:creator>mbruemmer</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[Ponemon Institute]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1564</guid>
		<description><![CDATA[The U.S. tops Germany, the U.K. and France when it comes to data breach notification costs. In other words, it costs American companies more to notify people of a data breach when their personal information is lost or stolen. The Ponemon Institute, which recently conducted a global data breach study, found that it cost U.S. [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F08%2F28%2Fu-s-beats-germany-u-k-and-france-when-it-comes-to-data-breach-notification-but-why%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach,Data+Breach+Notification,Ponemon+Institute&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/08/data-breach-cost.png"><img class="aligncenter  wp-image-1565" title="data-breach-cost" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/08/data-breach-cost.png" alt="" width="500" height="344" /></a></p>
<p>The U.S. tops Germany, the U.K. and France when it comes to<a title="Ponemon Notification Study" href="http://www.experian.com/innovation/business-resources/ponemon-notification-study.jsp"> data breach notification costs</a>. In other words, it costs American companies more to notify people of a data breach when their personal information is lost or stolen.</p>
<p>The Ponemon Institute, which recently conducted a global data breach study, found that it cost U.S. companies an average of $561,500 to notify victims per breach, compared to $303,600 for German companies and $223,100 for companies in the U.K. Even more interesting, is that in some countries – like India and Australia – companies only spend an average of $31,000 (India) and $80,000 (Australia) to notify customers of a data breach. (All figures are U.S. dollars)</p>
<p>So why do American companies spend so much more on <a title="Ponemon Notification Study" href="http://www.experian.com/innovation/business-resources/ponemon-notification-study.jsp">data breach notification</a>?</p>
<p>The answer is mainly due to numerous laws and regulations. Currently, 46 states have breach notification laws and several federal agencies, such as the Department of Health and<strong> </strong>Human Services, require organizations to notify potential victims when their unsecured protected health information is breached.</p>
<p>In contrast, countries without breach notification laws – like India and Australia – spend much less because they don’t have to notify all of their data breach victims. Countries like Germany and the U.K. have strict notification requirements, although not as tough as the U.S.</p>
<p>American companies and organizations may not be able to do much about notification costs, which are expected to continue to rise. But there are other measures that can be taken to lower the cost of a breach. For example:</p>
<ul>
<li>Negotiating a pre-breach agreement with a data breach resolution provider to lock in a good rate ahead of time.</li>
<li>A chief information security officer (CISO) who is responsible for enterprise data protection can reduce the cost of a breach by as much as $80 per record, according to the Ponemon Institute.</li>
<li>Increased loyalty by treating potential victims fairly and providing them with credit and/or identity protection can prevent the loss of customers and potentially save millions.</li>
</ul>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/08/28/u-s-beats-germany-u-k-and-france-when-it-comes-to-data-breach-notification-but-why/&via=Experian_DBR&text=U.S. beats Germany, U.K. and France when it comes to data breach notification costs, but why?&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F08%2F28%2Fu-s-beats-germany-u-k-and-france-when-it-comes-to-data-breach-notification-but-why%2F&amp;title=U.S.%20beats%20Germany%2C%20U.K.%20and%20France%20when%20it%20comes%20to%20data%20breach%20notification%20costs%2C%20but%20why%3F" id="wpa2a_6"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/08/28/u-s-beats-germany-u-k-and-france-when-it-comes-to-data-breach-notification-but-why/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Webinar: Data breaches can happen anytime, anywhere</title>
		<link>http://www.experian.com/blogs/data-breach/2012/07/19/webinar-data-breaches-can-happen-anytime-anywhere/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/07/19/webinar-data-breaches-can-happen-anytime-anywhere/#comments</comments>
		<pubDate>Thu, 19 Jul 2012 16:15:21 +0000</pubDate>
		<dc:creator>mbruemmer</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Ponemon Institute]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1460</guid>
		<description><![CDATA[Can you imagine losing backup disks containing information for 300,000 patients? Or having computer back-up tapes stolen? What if someone hacked into your network servers or lost important laptops? These aren’t hypothetical scenarios. They’re real data breach cases that have occurred in recent years. Can this happen to you? You bet. The key is being [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F07%2F19%2Fwebinar-data-breaches-can-happen-anytime-anywhere%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Data+Breach,Data+Breach+Notification,data+breach+response,Identity+Theft,Ponemon+Institute&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/07/data-breach-hacker.jpg"><img class="aligncenter  wp-image-1469" title="data-breach-hacker" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/07/data-breach-hacker.jpg" alt="" width="509" height="339" /></a></p>
<p>Can you imagine losing backup disks containing information for 300,000 patients? Or having computer back-up tapes stolen? What if someone hacked into your network servers or lost important laptops? These aren’t hypothetical scenarios. They’re real data breach cases that have occurred in recent years. Can this happen to you? You bet. The key is being prepared for the inevitable.</p>
<p>I would like to invite you to participate in an informative webinar on this important issue. I will be joined by Dr. Larry Ponemon, a data protection “think tank” pioneer and Chairman of the Ponemon Institute, and Karen Murray, Vice President, Chief Compliance Officer of Steward Health Care System in a discussion focusing on the latest data breach trends, how to prepare for a data breach and the best ways to respond to a breach.</p>
<p>The 90-minute webinar, delivered in conjunction with the Health Care Compliance Association (HCCA), will be held at noon CST on July 25, 2012 and participants may be eligible for CEUs.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Webinar: Preparing for the First 24 Hours of a Data Breach" href="http://www.experian.com/innovation/business-resources/data-breach-compliance-and-response.jsp?WT.srch=ecd_dbres_blog_070912_article">Webinar Download: Data Breach Compliance and Response: Preparing for the First 24 Hours of a Data Breach and Beyond</a></div></div>
<p>In addition, the webinar will feature:</p>
<p>• The latest research about consumer notification from the Ponemon Institute<br />
• A look at healthcare data breach statistics<br />
• Best practices for data breach preparation from a compliance officer’s perspective.<br />
• Examples of what works &#8211; and doesn’t work &#8211; when responding to a data breach<br />
• How and why data breaches happen<br />
• How to budget the resources for a  potential breach<br />
• What do regulators expect from an organization that experienced a breach?<br />
• A question and answer period for participants</p>
<p>Come learn the best ways to try and prevent a data breach and the most effective methods to respond to one. Learn to minimize your costs and help protect your reputation.</p>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/07/19/webinar-data-breaches-can-happen-anytime-anywhere/&via=Experian_DBR&text=Webinar: Data breaches can happen anytime, anywhere&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F07%2F19%2Fwebinar-data-breaches-can-happen-anytime-anywhere%2F&amp;title=Webinar%3A%20Data%20breaches%20can%20happen%20anytime%2C%20anywhere" id="wpa2a_8"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/07/19/webinar-data-breaches-can-happen-anytime-anywhere/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Three reasons your breach notices are flawed</title>
		<link>http://www.experian.com/blogs/data-breach/2012/06/05/three-reasons-your-breach-notices-are-flawed/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/06/05/three-reasons-your-breach-notices-are-flawed/#comments</comments>
		<pubDate>Tue, 05 Jun 2012 17:14:18 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[Ponemon Institute]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1286</guid>
		<description><![CDATA[Still using the less-is-more approach to notification letters? As it turns out, consumers want more – much more than they’re getting. In a new study, 72% of consumers who recall receiving a notification letter express disappointment. The Ponemon Institute explores why in the 2012 Consumer Study on Data Breach Notification. Among all survey respondents, those [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F06%2F05%2Fthree-reasons-your-breach-notices-are-flawed%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach+Notification,data+breach+response,Ponemon+Institute&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/06/stack-of-letters.jpg"><img class="aligncenter size-full wp-image-1292" title="stack-of-letters" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/06/stack-of-letters.jpg" alt="" width="454" height="184" /></a></p>
<p>Still using the less-is-more approach to notification letters? As it turns out, consumers want more – much more than they’re getting.</p>
<p>In a new study, 72% of consumers who recall receiving a notification letter express disappointment. The Ponemon Institute explores why in the 2012 Consumer Study on<a title="Ponemon Notification Study Download" href="http://www.experian.com/data-breach/ponemon-notification-study.html?WT.srch=ecd_dbres_notification_blog_article"> Data Breach Notification</a>.</p>
<p>Among all survey respondents, those who do and do not recall receiving a notice, 85% verify that learning about the loss or theft of their data is pertinent to them. But only if there’s a certainty of risk, a belief shared by 57% of respondents. An even larger percentage (63%) feels entitled to compensation, such as credit monitoring or identity protection, if their data is lost.</p>
<p>Yet, despite having clear ideas on what they do or don’t want following the loss of their data, most consumers aren’t paying attention to<a title="What consumers should know about data breach notification" href="http://www.experian.com/blogs/data-breach/2011/11/02/what-consumers-should-know-about-data-breach-notification/"> breach notices</a>, according to Ponemon. Only 25% of participants in the study could recall receiving one. Among that group, 35% recalled receiving at least three.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Ponemone Consumer Study on Data Breach Notification" href="http://www.experian.com/innovation/business-resources/ponemon-notification-study.jsp?WT.srch=ecd_dbres_blog_060512_article ">Download the 2012 Consumer Study on Data Breach Notification </a>to find out why consumers are critical of the notification letters they receive. </div></div>
<p>It’s this subset of the study that provides valuable insight into why today’s notifications aren’t working. Here are three flaws:</p>
<p>1. Too Few Details<br />
Sixty-seven percent of respondents who recall receiving a breach notice did not receive enough information about the incident. That includes 44% who did not know what type of data had been lost or stolen, leaving them unsure of what steps to take to protect themselves.</p>
<p>2. Difficult to Understand<br />
Sixty-one percent did not understand the notification, largely due to the length of the letter and complexity of the language. In addition, 37% had no idea what the incident was about even after reading the notice. This led 41% to assume their data had been stolen.</p>
<p>3. Not Believable<br />
Forty-five percent found the message in the letter unbelievable, and 44% of them believed the company was hiding key facts about the breach.</p>
<p>Consumers acted on their disappointment to varying degrees:<br />
• 15% planned to terminate their relationship with the breached company<br />
• 39% contemplated doing so<br />
• 35% would continue the relationship so long as the organization doesn’t experience another breach</p>
<p>The numbers reflect poorly on today’s notification efforts, confirming the need for change. Consumers want simple language and clear explanations of what happened and the risks they face, plus a protection product to compensate for the data exposure, according to the study.</p>
<p>So why not work with your legal counsel to deliver just that in a way that protects your company and satisfies your consumers? Otherwise, your breach notices will continue to alienate and confuse. As <a title="Ponemon Notification Study" href="http://www.experian.com/data-breach/ponemon-notification-study.html?WT.srch=ecd_dbres_notification_blog_article">this study </a>shows, that only serves to erode customer loyalty and trust, making data loss even more costly in the long run.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/06/05/three-reasons-your-breach-notices-are-flawed/&via=Experian_DBR&text=Three reasons your breach notices are flawed&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F06%2F05%2Fthree-reasons-your-breach-notices-are-flawed%2F&amp;title=Three%20reasons%20your%20breach%20notices%20are%20flawed" id="wpa2a_10"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/06/05/three-reasons-your-breach-notices-are-flawed/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Responding resourcefully to medical data breaches</title>
		<link>http://www.experian.com/blogs/data-breach/2012/04/26/responding-resourcefully-to-medical-data-breaches/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/04/26/responding-resourcefully-to-medical-data-breaches/#comments</comments>
		<pubDate>Thu, 26 Apr 2012 22:58:01 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[PHI]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1153</guid>
		<description><![CDATA[&#160; It’s safe to say that healthcare data is/are under attack. Breaches of medical records increased 97% from 2010 to 2011 according to HHS data. Statistics like that lend new urgency and importance to gatherings such as the upcoming HCCA 2012 Compliance Institute. Be prepared: Does your organization observe security protocols and have controls in [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F04%2F26%2Fresponding-resourcefully-to-medical-data-breaches%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Compliance,Data+Breach+Notification,healthcare,HIPAA,PHI&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>&nbsp;</p>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/04/patient-data-breaches1.jpg"><img class="aligncenter size-full wp-image-1166" title="patient-data-breaches" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/04/patient-data-breaches1.jpg" alt="" width="400" height="300" /></a></p>
<p>It’s safe to say that healthcare data is/are under attack. Breaches of <a title="Differentiating factors of a healthcare breach" href="http://www.experian.com/blogs/data-breach/2012/04/10/5-differentiating-factors-of-a-healthcare-breach/">medical records increased 97% </a>from 2010 to 2011 according to HHS data. Statistics like that lend new urgency and importance to gatherings such as the upcoming HCCA 2012 Compliance Institute.</p>
<p><strong>Be prepared:</strong> Does your organization observe security protocols and have controls in place to protect patient health information (PHI)?</p>
<p><strong>Have a response plan ready to deploy:</strong> In the event of a data breach, the first thing to do is activate your <a title="Data breach response plan" href="http://www.experian.com/blogs/data-breach/2011/02/22/develop-a-breach-response-plan-now-to-be-ready-to-efficiently-address-a-breach-as-soon-as-it-is-reported/">response plan</a>. In general, this plan spells out in great detail everything from who will lead the response team to step-by-step processes for sending out notifications, customer care and more.</p>
<p><strong>Evaluate your situation post-breach:</strong> Once you’ve weathered the storm of a data breach and its consequences, take time to review the ways your organization responded and grade your response plan. This is also the time to make changes, small and substantial, to the response plan and implement any other protections or processes that you feel would improve your readiness and ability to respond in the event of another incident.</p>
<p>Look for Experian at the 2012 Compliance Institute in Las Vegas from April 29 to May 1. It’s a great opportunity to immerse yourself in solutions for preventing and managing data breaches, as well as meet experts who can help your organization be better prepared in the event of an incident.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Ponemon Third Annual Medical Identity Theft Study" href="http://www.experian.com/innovation/business-resources/ponemon-third-annual-medical-id-theft-study.jsp?WT.srch=ecd_dbres_blog_042612_article">Download the Ponemon Medical Identity Theft Study to learn the costly consequences facing patients and providers</a>.</div></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/04/26/responding-resourcefully-to-medical-data-breaches/&via=Experian_DBR&text=Responding resourcefully to medical data breaches&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F04%2F26%2Fresponding-resourcefully-to-medical-data-breaches%2F&amp;title=Responding%20resourcefully%20to%20medical%20data%20breaches" id="wpa2a_12"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/04/26/responding-resourcefully-to-medical-data-breaches/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Infographic: Unlock data breach facts</title>
		<link>http://www.experian.com/blogs/data-breach/2012/03/12/unlock-data-breach-facts/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/03/12/unlock-data-breach-facts/#comments</comments>
		<pubDate>Mon, 12 Mar 2012 17:12:33 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Business identity theft]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[Ponemon Institute]]></category>
		<category><![CDATA[Security Breaches]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1071</guid>
		<description><![CDATA[Tweet]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F03%2F12%2Funlock-data-breach-facts%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Business+identity+theft,Data+Breach,Data+Breach+Notification,data+breach+response,Ponemon+Institute,Security+Breaches&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<div style="text-align: center;"><div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Ponemon Aftermath Study" href="http://www.experian.com/innovation/business-resources/aftermath-after-data-breach.jsp?WT.srch=ecd_dbres_blog_031212_article "> Download the Ponemon Aftermath Study</a> to learn what companies experience following a data loss</div></div></div>
<div style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/03/UnlockDateBreachFacts2.jpg"><img class="aligncenter size-full wp-image-1079" title="UnlockDateBreachFacts" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/03/UnlockDateBreachFacts2.jpg" alt="" width="466" height="816" /></a></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/03/12/unlock-data-breach-facts/&via=Experian_DBR&text=Infographic: Unlock data breach facts&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F03%2F12%2Funlock-data-breach-facts%2F&amp;title=Infographic%3A%20Unlock%20data%20breach%20facts" id="wpa2a_14"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/03/12/unlock-data-breach-facts/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Extended fraud resolution is the new standard</title>
		<link>http://www.experian.com/blogs/data-breach/2012/03/05/extended-fraud-resolution-is-the-new-standard/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/03/05/extended-fraud-resolution-is-the-new-standard/#comments</comments>
		<pubDate>Mon, 05 Mar 2012 19:40:33 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Fraud Resolution]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[ProtectMyID]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1027</guid>
		<description><![CDATA[Customers see a data breach and the loss of their personal data as a threat to their security and finances, and with good reason. Identity theft occurs every four seconds in the United States, according to figures from the Federal Trade Commission. As consumers become savvier about protecting their personal data, they expect companies to [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F03%2F05%2Fextended-fraud-resolution-is-the-new-standard%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach+Notification,data+breach+response,Identity+Theft,Identity+Theft+Prevention,ProtectMyID&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/03/Privacy_hands.jpg"><img class="aligncenter size-full wp-image-1033" title="Privacy_hands" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/03/Privacy_hands.jpg" alt="" width="425" height="282" /></a></p>
<p>Customers see a data breach and the loss of their personal data as a threat to their security and finances, and with good reason. Identity theft occurs every four seconds in the United States, according to figures from the Federal Trade Commission.</p>
<p>As consumers become savvier about protecting their personal data, they expect companies to do the same. And to go the extra mile for them if a data breach occurs. That means providing protection that holds up under scrutiny. Protection that offers peace of mind, not just in the interim but years down the line.</p>
<p>The stronger the level of protection you provide to individuals affected in a breach, the stronger their brand loyalty. Just like with any product, consumers can tell the difference between valid protection products that work and ones that just don’t.</p>
<p>Experian® Data Breach Resolution takes care to provide the former, protection that works for your customers or employees affected in a breach and that reflects positively on you, as the company providing the protection.</p>
<p>Experian’s <a title="ProtectMyId Elite" href="http://www.experian.com/data-breach/identity-theft-monitoring.html" target="_blank"><span style="text-decoration: underline;">ProtectMyID® Elite</span></a> or <a title="ProtectMyId Alert" href="http://www.experian.com/data-breach/protectmyid-alert.html" target="_blank"><span style="text-decoration: underline;">ProtectMyID Alert</span></a> provides industry-leading identity protection and, now, extended fraud resolution care. ExtendCARE™ now comes standard with every ProtectMyID data breach redemption membership, at no additional cost to you or the member.</p>
<p>With ExtendCARE, the <a title="Identity theft resolution" href="http://www.experian.com/data-breach/data-compromise.html" target="_blank"><span style="text-decoration: underline;">identity theft resolution</span></a> portion of ProtectMyID remains active even when the full membership isn’t. ExtendCARE allows members to receive personalized assistance, not just advice, from an Identity Theft Resolution Agent. This high level of assistance is available any time identity theft occurs after individuals redeem their ProtectMyID memberships.</p>
<p>Extended protection from a global leader like Experian can put consumers’ minds at ease following a breach. If we can help you with pre-breach planning or data breach resolution, please contact us at 1 866 751 1323 or <a href="mailto:databreachinfo@experian.com?subject=Experian.com%20Contact%20Us%20Request">databreachinfo@experian.com</a>.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="ExtendCare by Experian" href="http://www.experian.com/data-breach/data-compromise.html?WT.srch=ecd_dbres_blog_030512_article ">Learn more about ExtendCare™</a> and see how Experian&#8217;s Fraud Resolution Agents can help you! </div></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/03/05/extended-fraud-resolution-is-the-new-standard/&via=Experian_DBR&text=Extended fraud resolution is the new standard&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F03%2F05%2Fextended-fraud-resolution-is-the-new-standard%2F&amp;title=Extended%20fraud%20resolution%20is%20the%20new%20standard" id="wpa2a_16"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/03/05/extended-fraud-resolution-is-the-new-standard/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The data breach reporting landscape &#8211; part 1</title>
		<link>http://www.experian.com/blogs/data-breach/2012/02/28/the-data-breach-reporting-landscape-part-1/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/02/28/the-data-breach-reporting-landscape-part-1/#comments</comments>
		<pubDate>Tue, 28 Feb 2012 16:25:22 +0000</pubDate>
		<dc:creator>kbarney</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Security Breaches]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1010</guid>
		<description><![CDATA[Our guest blogger this week is Karen Barney of the Identity Theft Resource Center (ITRC). As an organization specializing in monitoring and tracking data breaches, the ITRC has come across varying degrees of breaches and reasons for notification due to the varying types of compromised information. We would like to take this opportunity to address [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F02%2F28%2Fthe-data-breach-reporting-landscape-part-1%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach,Data+Breach+Notification,Data+Security,hackers,Security+Breaches&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/02/crumbling-lock.jpg"><img class="aligncenter size-full wp-image-1014" title="crumbling lock" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/02/crumbling-lock.jpg" alt="" width="509" height="338" /></a></p>
<p><em>Our guest blogger this week is Karen Barney of the Identity Theft Resource Center (ITRC).</em></p>
<p>As an organization specializing in monitoring and tracking data breaches, the <a title="itrc website" href="http://www.idtheftcenter.org/" class="broken_link" rel="nofollow">ITRC</a> has come across varying degrees of breaches and reasons for notification due to the varying types of compromised information. We would like to take this opportunity to address some of the differences and provide some insight into our approach for tracking data breach incidents.</p>
<p>According to most state laws, a data breach is an <em>incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so</em>. Data breaches may involve personal health information (PHI), personally identifiable information (PII), trade secrets or intellectual property.  Note that under these state breach laws, non-personal identifying information is <em>not</em> included.</p>
<p>Next, let’s consider hacking.  By definition, &#8220;hacking&#8221; is the deliberate and unauthorized access, use, disclosure, and/or taking of electronic data on a computer.  Hacking efforts target all types of information – from high level intellectual property down to individual personal information, both sensitive and non-sensitive information.  Taken together, these two situations result in nearly 26% of the “reported breaches” included on the 2011 Identity Theft Resource Center Breach List.</p>
<p>This brings us to the definition of “reported breaches”.  ITRC only publishes breach incident information which is available from credible, public resources.  Breach incidents are tracked daily from sources such as state Attorneys General offices, a variety of media sources, and other well-recognized and respected entities that track and capture this information from publicly available sources.  This approach means that the ITRC Breach Report only reflects the tip of the iceberg.</p>
<p>In 2011, 41% of the <a title="2011 Year of the Breach" href="http://www.experian.com/blogs/data-breach/2011/12/20/year-of-the-breach-2011-in-review/">breaches</a> on the ITRC report show the number of records exposed as “unknown.”  In addition, ITRC is aware of a significant number of breaches that are not made public.  As a result, it is not possible to provide truly accurate numbers – either for the number of breaches or the number of records.</p>
<p>The majority of “reported breaches” included in the list are those which have met “breach notification triggers” established by the various state laws regarding this issue.  Usually these incidents are electronic in nature, and must also expose information identified as PII, such as first and last name combined with a social security number, driver’s license or state identification number and/or financial account numbers (including debit and credit cards).   Some states have expanded this “trigger” definition to include medical and healthcare information.  This situation leaves large loopholes for breaches to remain unreported.</p>
<p>Currently we know that –</p>
<ul>
<li>An indeterminable number of breaches go unreported, even when <a title="Breach notification in three easy steps" href="http://www.experian.com/blogs/data-breach/2011/05/10/breach-notification-in-three-easy-steps/">notification</a> should have been triggered according to the applicable state laws.</li>
<li>Many breach notifications (at least what is disclosed by the entity) underreport the number of records</li>
<li>Many breach notifications also do not clearly define the types of information exposed.</li>
<li>Public information is often incomplete in detailing how the breach occurred</li>
<li>Many breaches involving non-PII, such as email addresses, user names, and passwords, are not reported because they do not meet “breach notification triggers” as established by various state laws</li>
</ul>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/02/28/the-data-breach-reporting-landscape-part-1/&via=Experian_DBR&text=The data breach reporting landscape - part 1&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F02%2F28%2Fthe-data-breach-reporting-landscape-part-1%2F&amp;title=The%20data%20breach%20reporting%20landscape%20%E2%80%93%20part%201" id="wpa2a_18"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/02/28/the-data-breach-reporting-landscape-part-1/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>