<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; data breach response</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/tag/data-breach-response/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>7 Things you should think about when you audit your response plan</title>
		<link>http://www.experian.com/blogs/data-breach/2012/12/13/7-things-you-should-think-about-when-you-audit-your-response-plan/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/12/13/7-things-you-should-think-about-when-you-audit-your-response-plan/#comments</comments>
		<pubDate>Thu, 13 Dec 2012 17:30:03 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Data Security]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1874</guid>
		<description><![CDATA[Now that your data breach response plan is in place and you’re confident that your company is safeguarded from malicious  data breach attempts, what can possibly be still the biggest threat to your data breach protection plan?  Answer: the plan itself. All the planning and preparation in the world won’t protect your business from a [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F12%2F13%2F7-things-you-should-think-about-when-you-audit-your-response-plan%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Cyber+Security,Data+Breach,Data+Breach+Notification,data+breach+response,data+privacy,Data+Security&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/12/response-plan-checklist.jpg"><img class="aligncenter  wp-image-1875" title="response-plan-checklist" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/12/response-plan-checklist.jpg" alt="" width="509" height="339" /></a></p>
<p>Now that your <a href="http://www.experian.com/blogs/data-breach/2012/03/12/unlock-data-breach-facts/">data breach</a> response plan is in place and you’re confident that your company is safeguarded from malicious <a href="http://www.experian.com/blogs/data-breach/2012/05/07/itrc-report-identifies-top-three-data-breach-triggers/"> data breach</a> attempts, what can possibly be still the biggest threat to your <a href="http://www.experian.com/blogs/data-breach/2012/02/21/when-data-recovery-becomes-a-data-disaster/">data breach protection</a> plan?  Answer: the plan itself. All the planning and preparation in the world won’t protect your business from a data breach if the response plan fails to work.  The business world is ever changing so it’s necessary to ensure that your response plan stays current and functional.</p>
<p>That is why it’s imperative that you regularly audit, test and update your plan on preferably, a quarterly basis.</p>
<p>Here are 7 checklist items to keep in mind when auditing your response plan:</p>
<p>1) Update your data breach response team contact list &#8211; Employees come and go therefore it’s important that the contact information for the members of your internal and external breach response team is current.  Make sure department heads are noted and once updated, re-distribute the list to the appropriate people.</p>
<p>2) Verify that your data breach response plan is comprehensive &#8211; Revise the plan to include any major company changes, such as new departments or adjustments in data management policies.  Check in with each response team member to ensure their department understands its role and what they need to do during a data breach.  Set up a mock <strong>breach of data</strong> scenario so that your response team can practice trial runs. Practice a full scale rehearsal annually so the plan is fully vetted and any adjustments can be made before an event occurs.</p>
<p>3) Double check your vendor contracts – Check that your contracts with your forensics firm, data breach resolution provider and other vendors are current and easily accessible.  Review your vendors and contracts and make sure they both still match your data protection and security needs.</p>
<p>4) Review notification guidelines – Verify that the data breach notification section of your response plan reflects the latest state legislation and that your notification letter templates address any new laws.  Ensureyour contact list of attorneys, government agencies and media is updated so you can easily notify them after a breach.  For medical data breaches, healthcare providers need to verify that Department of Health &amp; Human Services contacts are updated and their response team understands data breach information reporting procedures.</p>
<p>5) Check up on third parties that have access to your data &#8211; Evaluate how third parties are managing your data and if they are following your data protection rules.  Educate them on any new legislation that may affect you during a data breach.  Stress to third parties the importance of reporting a data breach to you immediately and what is expected in the resolution process. Healthcare companies need to meet HIPAA requirements and should check that business associate agreements (BAAs) are established.</p>
<p>6) Evaluate IT Security &#8211; Ensure proper data access controls are in place. Check that automated software and operating system updates for the entire company are installed properly. Verify that any automated security monitoring and reporting system is up to date and working.  Store backup copies of data securely.</p>
<p>7) Review staff security awareness – Verify that your staff is up to date on company policy regarding data security procedures, including what digital and paper documents to keep and how to securely discard what is not needed.  Train staffto identify signs of cyber security threats in their daily work life and know the proper course of action in reporting a breach.  Check that employees are keeping their work related laptops, mobile and digital devices secure at all times and remind them to change passwords every three months.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/12/13/7-things-you-should-think-about-when-you-audit-your-response-plan/&via=Experian_DBR&text=7 Things you should think about when you audit your response plan&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F12%2F13%2F7-things-you-should-think-about-when-you-audit-your-response-plan%2F&amp;title=7%20Things%20you%20should%20think%20about%20when%20you%20audit%20your%20response%20plan" id="wpa2a_2"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/12/13/7-things-you-should-think-about-when-you-audit-your-response-plan/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>BYOD leads to data breaches in the workplace</title>
		<link>http://www.experian.com/blogs/data-breach/2012/11/01/byod-leads-to-data-breaches-in-the-workplace/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/11/01/byod-leads-to-data-breaches-in-the-workplace/#comments</comments>
		<pubDate>Thu, 01 Nov 2012 16:38:59 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Business identity theft]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[Data Security]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1738</guid>
		<description><![CDATA[  While technology undoubtedly has made accessing medical information much easier and faster, it also has also provided an increased potential for medical data breaches especially as health personnel begin to use unsecure mobile devices for personal and work use.  With an increase in health care employees using their own tablets and smartphones in the [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F11%2F01%2Fbyod-leads-to-data-breaches-in-the-workplace%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Business+identity+theft,Data+Breach,data+breach+response,Data+Security&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"> <a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/11/byod.jpg"><img class="aligncenter  wp-image-1741" title="byod" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/11/byod.jpg" alt="" width="512" height="329" /></a></p>
<p>While technology undoubtedly has made accessing medical information much easier and faster, it also has also provided an increased potential for <a href="http://www.experian.com/blogs/data-breach/2012/05/02/medical-and-mobile-convenience-trumps-security/">medical data breaches</a> especially as health personnel begin to use unsecure mobile devices for personal and work use.  With an increase in health care employees using their own tablets and smartphones in the workplace, many healthcare companies are considering adopting a Bring Your Own Device (BYOD) policy.  However, many companies have failed to implement mobile <a href="http://www.experian.com/blogs/data-breach/2012/07/31/three-data-protection-strategies-to-catch-a-phish/">data breach protection</a>, breaking the HIPAA Security Rule which requires healthcare companies to perform a risk analysis of the processes by which they protect the confidentiality of electronic patient health information maintained by their organization.  Companies are required to use the information gathered from the analysis to take measures to ensure the confidentiality of patient data and to reduce risks to a reasonable level.  If companies don’t comply and there is a <a href="http://www.experian.com/blogs/data-breach/2012/05/07/itrc-report-identifies-top-three-data-breach-triggers/">data security breach</a>, they can be heavily fined by the U.S. Department of Health &amp; Human Services.</p>
<p>Just recently, a teaching hospital and medical practice associated with a large university was fined $1.5 million in a <a href="http://www.experian.com/blogs/data-breach/2012/05/15/healthcare-breaches-fraud-are-here-to-stay/">data breach</a> of patient information when a laptop computer containing unencrypted data on 3,621 patients and research subjects was stolen.  Hospital and practice officials were found guilty of violating the HIPAA Security Rule by not implementing <a href="http://www.experian.com/blogs/data-breach/2012/04/03/the-rx-for-medical-breaches/">data protection and security</a> on their mobile devices.  The loss of laptops, portable storage gadgets like thumb drives and cell phones have already cost insurance companies, drugstores, medical practices and even a government health and social services department, millions of dollars in fines.</p>
<p>Unfortunately, this troubling trend doesn’t just affect the medical industry.  In August 2012, Coalfire (a firm that provides IT audit and risk assessment) surveyed 400 individuals across North America covering a variety of industries about their company’s mobile device security practices. The data revealed that many organizations lack policies addressing mobile <a href="http://www.experian.com/blogs/data-breach/2012/10/09/cyber-security-escalates-in-importance/">cyber security threats</a>.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Data Breach Response Guide" href="http://www.experian.com/innovation/business-resources/data-breach-response-guide.jsp?WT.srch=ecd_dbres_blog_110112_article_cta ">Download Your Free Data Breach Response Plan</a></div></div>
<p><strong>Key statistics from the survey:</strong></p>
<ul>
<li>84 percent use the same smartphone for personal and work usage.</li>
<li>47 percent don’t have a password on their mobile phone.</li>
<li>51 percent said their companies cannot remotely wipe data from mobile devices if they are lost or stolen.</li>
<li>49 percent said their IT departments have not discussed mobile/cyber security with them.</li>
</ul>
<p>Clearly, companies are not doing enough to protect themselves and their employees from the expensive <a href="http://www.experian.com/blogs/data-breach/2011/08/16/the-dollars-of-a-data-breach/">cost of a data breach</a>.  As mobile devices become popular and less expensive, workers will naturally want to use them for their jobs.  Therefore, it is prudent for companies to adopt <a href="http://www.experian.com/blogs/data-breach/2012/09/11/when-are-small-businesses-too-small-for-data-breach-never/">business data breach</a> protection and security policies to protect not only their company data but also their pocketbook.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/11/01/byod-leads-to-data-breaches-in-the-workplace/&via=Experian_DBR&text=BYOD leads to data breaches in the workplace&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F11%2F01%2Fbyod-leads-to-data-breaches-in-the-workplace%2F&amp;title=BYOD%20leads%20to%20data%20breaches%20in%20the%20workplace" id="wpa2a_4"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/11/01/byod-leads-to-data-breaches-in-the-workplace/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Federal breach notice: A view worth the climb?</title>
		<link>http://www.experian.com/blogs/data-breach/2012/10/16/federal-breach-notice-a-view-worth-the-climb/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/10/16/federal-breach-notice-a-view-worth-the-climb/#comments</comments>
		<pubDate>Tue, 16 Oct 2012 20:09:05 +0000</pubDate>
		<dc:creator>gredmon</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[National Cyber Security Awareness Month]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1669</guid>
		<description><![CDATA[Working for a company that navigates 46 different state breach notice laws and a plethora of sector based federal breach notice laws, I’m often asked what I think the likelihood is that the Federal Government will pass a comprehensive data breach notification law that supersedes all the state laws. ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F10%2F16%2Ffederal-breach-notice-a-view-worth-the-climb%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Data+Breach,Data+Breach+Notification,data+breach+response,Data+Security,National+Cyber+Security+Awareness+Month&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><em><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/10/federal-breach-notice_a-view-worth-the-climb.jpg"><img class="aligncenter  wp-image-1673" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/10/federal-breach-notice_a-view-worth-the-climb.jpg" alt="" width="441" height="441" /></a></em></p>
<p>&nbsp;</p>
<p><em>Our guest blogger this week is Gant Redmon, General Counsel &amp; Vice President of Business Development at Co3 Systems.</em></p>
<p>Working for a company that navigates 46 different state breach notice laws and a plethora of sector based federal breach notice laws, I’m often asked what I think the likelihood is that the Federal Government will pass a comprehensive data breach notification law that supersedes all the state laws. While I don’t rule out a federal law passing at some point, I see it setting a floor of breach response responsibility rather than superseding everything already in place.</p>
<p>Put yourself in the shoes of a legislator trying to harmonize all the different state laws. That legislator is going to have three big political challenges.</p>
<p>The first challenge is choosing a single standard in the face of wildly different state standards. How will affected states feel about the Federal government imposing a different standard than the one they’ve settled on? Changing the rules in dozens of states will cause upheaval with political fallout.</p>
<p>The second challenge will be dealing with state attorneys general and treasurers. State AG’s are becoming more and more active in tracking breaches and cracking down on companies that don’t provide proper notice or have adequate security procedures. Part of that crackdown includes fines collected that go to the state treasury. A federal law will strip those AGs of the rule of privacy protectors and redirect funds to the federal government and away from the states.</p>
<p>The third challenge is that some states, like California and Virginia, go above even Federal notice requirements. What legislator wants to be known as the one who diluted people’s privacy rights by pre-empting strong protections and replacing them with weaker ones?</p>
<p>When trying to solve a problem, the first thing I ask is if I’m dealing with a problem worth solving. Privacy professionals and law firms have become well versed in the different state laws. Software solutions also exist that track all the different laws and provide incident response plans that are easy to follow. If the problem here is the complexity involved in dealing with disparate state breach notice laws, then we don’t have a problem worth solving.</p>
<p><em>“The opinions reflected in this article are solely those of the author and do not reflect the views of Experian Data Breach Resolution or any of its sister companies.”</em></p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/10/16/federal-breach-notice-a-view-worth-the-climb/&via=Experian_DBR&text=Federal breach notice: A view worth the climb?&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/10/16/federal-breach-notice-a-view-worth-the-climb/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Connecticut gets serious about breach reporting</title>
		<link>http://www.experian.com/blogs/data-breach/2012/10/02/connecticut-gets-serious-about-breach-reporting/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/10/02/connecticut-gets-serious-about-breach-reporting/#comments</comments>
		<pubDate>Tue, 02 Oct 2012 15:03:48 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[National Cyber Security Awareness Month]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1650</guid>
		<description><![CDATA[Get ready, Connecticut. A new data breach law is now in effect that brings the Office of the Attorney General (OAG) into the reporting loop. The new law requires notifying the OAG by email no later than when affected consumers are notified. Previously, businesses were only required to report a breach to consumers. Yet Attorney [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F10%2F02%2Fconnecticut-gets-serious-about-breach-reporting%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach,Data+Breach+Notification,data+breach+response,National+Cyber+Security+Awareness+Month&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/10/connecticut-gets-serious-about-breach-reporting.png"><img class="aligncenter  wp-image-1653" title="connecticut-gets-serious-about-breach-reporting" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/10/connecticut-gets-serious-about-breach-reporting.png" alt="" width="547" height="318" /></a></p>
<p>Get ready, Connecticut. A new data breach law is now in effect that brings the Office of the Attorney General (OAG) into the reporting loop.</p>
<p>The new law requires notifying the OAG by email no later than when affected consumers are notified. Previously, businesses were only required to report a breach to consumers. Yet Attorney General George Jepsen and his office were tasked with enforcing state breach laws – hard to do when you don’t know about the incidents.</p>
<p>But that’s all changed. Assistant Attorney General Matthew Fitzsimmons and the office’s Privacy Task Force will monitor the incoming emails. The new reporting requirement and newish task force (it was created last year) give the OAG more oversight of breach activity that may be putting consumers at risk. With more oversight comes better enforcement – at least that’s certainly what the OAG hopes.</p>
<p>Connecticut requires consumer notification when a breach involves unencrypted, computerized personal data. The state’s definition of “personal data” includes someone’s first and last names in combination with at least one of three data types: a Social Security number; a driver’s license or state identification number; or a financial account number, such as a credit card number, along with the access code for the account.</p>
<p>Businesses that don’t comply with the new law may find themselves in violation of the state’s Fair Trade Practices Act. Remember that sooner is better than later when it comes to breach reporting. At least if you want to avoid fines and violations.</p>
<p>Here’s the new email address for reporting breaches in Connecticut: <a href="mailto:ag.breach@ct.gov">ag.breach@ct.gov</a>.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"> <a href="http://www.experian.com/innovation/business-resources/ponemon-notification-study.jsp?WT.srch=ecd_dbres_blog_100212_article">Download the Ponemon Notification Study to find out what kind of notification letters your customers want &#8211; and why it&#8217;s important to deliver.</a> </div></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/10/02/connecticut-gets-serious-about-breach-reporting/&via=Experian_DBR&text=Connecticut gets serious about breach reporting&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F10%2F02%2Fconnecticut-gets-serious-about-breach-reporting%2F&amp;title=Connecticut%20gets%20serious%20about%20breach%20reporting" id="wpa2a_6"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/10/02/connecticut-gets-serious-about-breach-reporting/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>IAPP Privacy Academy: Will you be there?</title>
		<link>http://www.experian.com/blogs/data-breach/2012/09/25/iapp-privacy-academy-will-you-be-there/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/09/25/iapp-privacy-academy-will-you-be-there/#comments</comments>
		<pubDate>Tue, 25 Sep 2012 07:00:54 +0000</pubDate>
		<dc:creator>mbruemmer</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[IAPP]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1633</guid>
		<description><![CDATA[Join us for an interactive discussion on key data breach mistakes and how to overcome them on October 11 at the IAPP Privacy Academy in San Jose. Also, stop by the Experian booth to meet our team, network with your peers, and enter for a chance to win an Apple® MacBook Air.

]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F09%2F25%2Fiapp-privacy-academy-will-you-be-there%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,data+breach+response,IAPP&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"> <a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/09/conference_room1.jpg"><img class="aligncenter  wp-image-1638" title="conference_room" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/09/conference_room1.jpg" alt="" width="480" height="357" /></a></p>
<p>You see stories about data breaches all the time. Earlier this month, in fact, a small medical facility was fined $1.5 million following a data breach that resulted from a stolen, unencrypted laptop. News like that makes security, legal and compliance professionals shudder. But could the medical facility have avoided that fine? Absolutely. What about after a data breach? What happens during the recovery and remediation process? Do you know what you should do and shouldn’t do to avoid fines and litigation?    </p>
<p>Join us for an interactive discussion on key data breach mistakes and how to overcome them on October 11 at the <a title="IAPP Website" href="https://www.privacyassociation.org/events_and_programs/iapp_privacy_academy_2012/breakout_sessions15" rel="nofollow" target="_blank" class="broken_link">IAPP Privacy Academy</a> in San Jose. Also, stop by the Experian booth to meet our team, network with your peers, and enter for a chance to win an Apple® MacBook Air.</p>
<p>I will be participating on the data breach panel to discuss the best ways to respond to a breach to avoid potential fines and legal action. The panel will also discuss how to protect your customers or patients to maintain their loyalty and how to recover losses through insurance. You’ll leave with:</p>
<ul>
<li>Key lessons from significant breaches and  issues arising from their investigations, including consequences and challenges</li>
<li>Best practices for handling some of the most unusual situations</li>
<li>Tips for handling notification and communication effectively</li>
</ul>
<p>For more information about the IAPP Privacy Academy<a title="Data Breach Events page" href="http://www.experian.com/data-breach/events.html" target="_blank"> click here</a>.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/09/25/iapp-privacy-academy-will-you-be-there/&via=Experian_DBR&text=IAPP Privacy Academy: Will you be there?&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/09/25/iapp-privacy-academy-will-you-be-there/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Webinar: Data breaches can happen anytime, anywhere</title>
		<link>http://www.experian.com/blogs/data-breach/2012/07/19/webinar-data-breaches-can-happen-anytime-anywhere/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/07/19/webinar-data-breaches-can-happen-anytime-anywhere/#comments</comments>
		<pubDate>Thu, 19 Jul 2012 16:15:21 +0000</pubDate>
		<dc:creator>mbruemmer</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Ponemon Institute]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1460</guid>
		<description><![CDATA[Can you imagine losing backup disks containing information for 300,000 patients? Or having computer back-up tapes stolen? What if someone hacked into your network servers or lost important laptops? These aren’t hypothetical scenarios. They’re real data breach cases that have occurred in recent years. Can this happen to you? You bet. The key is being [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F07%2F19%2Fwebinar-data-breaches-can-happen-anytime-anywhere%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Data+Breach,Data+Breach+Notification,data+breach+response,Identity+Theft,Ponemon+Institute&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/07/data-breach-hacker.jpg"><img class="aligncenter  wp-image-1469" title="data-breach-hacker" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/07/data-breach-hacker.jpg" alt="" width="509" height="339" /></a></p>
<p>Can you imagine losing backup disks containing information for 300,000 patients? Or having computer back-up tapes stolen? What if someone hacked into your network servers or lost important laptops? These aren’t hypothetical scenarios. They’re real data breach cases that have occurred in recent years. Can this happen to you? You bet. The key is being prepared for the inevitable.</p>
<p>I would like to invite you to participate in an informative webinar on this important issue. I will be joined by Dr. Larry Ponemon, a data protection “think tank” pioneer and Chairman of the Ponemon Institute, and Karen Murray, Vice President, Chief Compliance Officer of Steward Health Care System in a discussion focusing on the latest data breach trends, how to prepare for a data breach and the best ways to respond to a breach.</p>
<p>The 90-minute webinar, delivered in conjunction with the Health Care Compliance Association (HCCA), will be held at noon CST on July 25, 2012 and participants may be eligible for CEUs.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Webinar: Preparing for the First 24 Hours of a Data Breach" href="http://www.experian.com/innovation/business-resources/data-breach-compliance-and-response.jsp?WT.srch=ecd_dbres_blog_070912_article">Webinar Download: Data Breach Compliance and Response: Preparing for the First 24 Hours of a Data Breach and Beyond</a></div></div>
<p>In addition, the webinar will feature:</p>
<p>• The latest research about consumer notification from the Ponemon Institute<br />
• A look at healthcare data breach statistics<br />
• Best practices for data breach preparation from a compliance officer’s perspective.<br />
• Examples of what works &#8211; and doesn’t work &#8211; when responding to a data breach<br />
• How and why data breaches happen<br />
• How to budget the resources for a  potential breach<br />
• What do regulators expect from an organization that experienced a breach?<br />
• A question and answer period for participants</p>
<p>Come learn the best ways to try and prevent a data breach and the most effective methods to respond to one. Learn to minimize your costs and help protect your reputation.</p>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/07/19/webinar-data-breaches-can-happen-anytime-anywhere/&via=Experian_DBR&text=Webinar: Data breaches can happen anytime, anywhere&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F07%2F19%2Fwebinar-data-breaches-can-happen-anytime-anywhere%2F&amp;title=Webinar%3A%20Data%20breaches%20can%20happen%20anytime%2C%20anywhere" id="wpa2a_8"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/07/19/webinar-data-breaches-can-happen-anytime-anywhere/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Three reasons your breach notices are flawed</title>
		<link>http://www.experian.com/blogs/data-breach/2012/06/05/three-reasons-your-breach-notices-are-flawed/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/06/05/three-reasons-your-breach-notices-are-flawed/#comments</comments>
		<pubDate>Tue, 05 Jun 2012 17:14:18 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[Ponemon Institute]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1286</guid>
		<description><![CDATA[Still using the less-is-more approach to notification letters? As it turns out, consumers want more – much more than they’re getting. In a new study, 72% of consumers who recall receiving a notification letter express disappointment. The Ponemon Institute explores why in the 2012 Consumer Study on Data Breach Notification. Among all survey respondents, those [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F06%2F05%2Fthree-reasons-your-breach-notices-are-flawed%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach+Notification,data+breach+response,Ponemon+Institute&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/06/stack-of-letters.jpg"><img class="aligncenter size-full wp-image-1292" title="stack-of-letters" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/06/stack-of-letters.jpg" alt="" width="454" height="184" /></a></p>
<p>Still using the less-is-more approach to notification letters? As it turns out, consumers want more – much more than they’re getting.</p>
<p>In a new study, 72% of consumers who recall receiving a notification letter express disappointment. The Ponemon Institute explores why in the 2012 Consumer Study on<a title="Ponemon Notification Study Download" href="http://www.experian.com/data-breach/ponemon-notification-study.html?WT.srch=ecd_dbres_notification_blog_article"> Data Breach Notification</a>.</p>
<p>Among all survey respondents, those who do and do not recall receiving a notice, 85% verify that learning about the loss or theft of their data is pertinent to them. But only if there’s a certainty of risk, a belief shared by 57% of respondents. An even larger percentage (63%) feels entitled to compensation, such as credit monitoring or identity protection, if their data is lost.</p>
<p>Yet, despite having clear ideas on what they do or don’t want following the loss of their data, most consumers aren’t paying attention to<a title="What consumers should know about data breach notification" href="http://www.experian.com/blogs/data-breach/2011/11/02/what-consumers-should-know-about-data-breach-notification/"> breach notices</a>, according to Ponemon. Only 25% of participants in the study could recall receiving one. Among that group, 35% recalled receiving at least three.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Ponemone Consumer Study on Data Breach Notification" href="http://www.experian.com/innovation/business-resources/ponemon-notification-study.jsp?WT.srch=ecd_dbres_blog_060512_article ">Download the 2012 Consumer Study on Data Breach Notification </a>to find out why consumers are critical of the notification letters they receive. </div></div>
<p>It’s this subset of the study that provides valuable insight into why today’s notifications aren’t working. Here are three flaws:</p>
<p>1. Too Few Details<br />
Sixty-seven percent of respondents who recall receiving a breach notice did not receive enough information about the incident. That includes 44% who did not know what type of data had been lost or stolen, leaving them unsure of what steps to take to protect themselves.</p>
<p>2. Difficult to Understand<br />
Sixty-one percent did not understand the notification, largely due to the length of the letter and complexity of the language. In addition, 37% had no idea what the incident was about even after reading the notice. This led 41% to assume their data had been stolen.</p>
<p>3. Not Believable<br />
Forty-five percent found the message in the letter unbelievable, and 44% of them believed the company was hiding key facts about the breach.</p>
<p>Consumers acted on their disappointment to varying degrees:<br />
• 15% planned to terminate their relationship with the breached company<br />
• 39% contemplated doing so<br />
• 35% would continue the relationship so long as the organization doesn’t experience another breach</p>
<p>The numbers reflect poorly on today’s notification efforts, confirming the need for change. Consumers want simple language and clear explanations of what happened and the risks they face, plus a protection product to compensate for the data exposure, according to the study.</p>
<p>So why not work with your legal counsel to deliver just that in a way that protects your company and satisfies your consumers? Otherwise, your breach notices will continue to alienate and confuse. As <a title="Ponemon Notification Study" href="http://www.experian.com/data-breach/ponemon-notification-study.html?WT.srch=ecd_dbres_notification_blog_article">this study </a>shows, that only serves to erode customer loyalty and trust, making data loss even more costly in the long run.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/06/05/three-reasons-your-breach-notices-are-flawed/&via=Experian_DBR&text=Three reasons your breach notices are flawed&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F06%2F05%2Fthree-reasons-your-breach-notices-are-flawed%2F&amp;title=Three%20reasons%20your%20breach%20notices%20are%20flawed" id="wpa2a_10"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/06/05/three-reasons-your-breach-notices-are-flawed/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Where will you be on April 29, 2012?</title>
		<link>http://www.experian.com/blogs/data-breach/2012/04/27/where-will-you-be-on-april-29-2012/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/04/27/where-will-you-be-on-april-29-2012/#comments</comments>
		<pubDate>Fri, 27 Apr 2012 15:30:00 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[healthcare data breach]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[medical fraud]]></category>
		<category><![CDATA[ProtectMyID]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1140</guid>
		<description><![CDATA[﻿ Experian will be at the annual HCCA 2012 Compliance Institute conference at Caesar’s Palace in Las Vegas. This conference offers an important opportunity to meet industry professionals with solid credentials in a number of areas related to medical information and data security. Some of the topics to be addressed at the conference include healthcare [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F04%2F27%2Fwhere-will-you-be-on-april-29-2012%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=data+breach+response,healthcare+data+breach,HIPAA,medical+fraud,ProtectMyID&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;">﻿</p>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/04/caesars-palace-las-vegas.jpg"><img class="size-full wp-image-1143" title="Caesars Palace in Las Vegas" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/04/caesars-palace-las-vegas.jpg" alt="" width="512" height="340" /></a></p>
<p style="text-align: left;">Experian will be at the annual HCCA 2012 Compliance Institute conference at Caesar’s Palace in Las Vegas. This conference offers an important opportunity to meet industry professionals with solid credentials in a number of areas related to medical information and data security. Some of the topics to be addressed at the conference include healthcare reform, compliance effectiveness and HIPAA privacy/data breach.</p>
<p>Attendees at the Compliance Institute can choose from 128 sessions and 225 speakers. Special conference tracks address legal and regulatory issues and privacy and security concerns, as well as general compliance. Also offered are advanced discussion groups, industry immersions, speed networking and more. For more information, go to <a rel="nofollow" href="http://www.compliance-institute.org/" class="broken_link">http://www.compliance-institute.org/</a>.</p>
<p>Come and visit our booth. We’ll talk about ProtectMyID<sup>®</sup>, Surveillance Alerts<sup>TM</sup> and ProtectMyID<sup>®</sup> ExtendCARE<sup>TM</sup>, as well as other Experian products that can play a critical role in protecting your organization, informing patients of a data breach and helping your organization recover from an incident. You can also enter your name in a drawing for a chance to win a new iPad.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/04/27/where-will-you-be-on-april-29-2012/&via=Experian_DBR&text=Where will you be on April 29, 2012?&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F04%2F27%2Fwhere-will-you-be-on-april-29-2012%2F&amp;title=Where%20will%20you%20be%20on%20April%2029%2C%202012%3F" id="wpa2a_12"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/04/27/where-will-you-be-on-april-29-2012/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Infographic: Unlock data breach facts</title>
		<link>http://www.experian.com/blogs/data-breach/2012/03/12/unlock-data-breach-facts/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/03/12/unlock-data-breach-facts/#comments</comments>
		<pubDate>Mon, 12 Mar 2012 17:12:33 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Business identity theft]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[Ponemon Institute]]></category>
		<category><![CDATA[Security Breaches]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1071</guid>
		<description><![CDATA[Tweet]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F03%2F12%2Funlock-data-breach-facts%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Business+identity+theft,Data+Breach,Data+Breach+Notification,data+breach+response,Ponemon+Institute,Security+Breaches&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<div style="text-align: center;"><div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Ponemon Aftermath Study" href="http://www.experian.com/innovation/business-resources/aftermath-after-data-breach.jsp?WT.srch=ecd_dbres_blog_031212_article "> Download the Ponemon Aftermath Study</a> to learn what companies experience following a data loss</div></div></div>
<div style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/03/UnlockDateBreachFacts2.jpg"><img class="aligncenter size-full wp-image-1079" title="UnlockDateBreachFacts" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/03/UnlockDateBreachFacts2.jpg" alt="" width="466" height="816" /></a></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/03/12/unlock-data-breach-facts/&via=Experian_DBR&text=Infographic: Unlock data breach facts&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F03%2F12%2Funlock-data-breach-facts%2F&amp;title=Infographic%3A%20Unlock%20data%20breach%20facts" id="wpa2a_14"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/03/12/unlock-data-breach-facts/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Extended fraud resolution is the new standard</title>
		<link>http://www.experian.com/blogs/data-breach/2012/03/05/extended-fraud-resolution-is-the-new-standard/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/03/05/extended-fraud-resolution-is-the-new-standard/#comments</comments>
		<pubDate>Mon, 05 Mar 2012 19:40:33 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Fraud Resolution]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[ProtectMyID]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1027</guid>
		<description><![CDATA[Customers see a data breach and the loss of their personal data as a threat to their security and finances, and with good reason. Identity theft occurs every four seconds in the United States, according to figures from the Federal Trade Commission. As consumers become savvier about protecting their personal data, they expect companies to [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F03%2F05%2Fextended-fraud-resolution-is-the-new-standard%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach+Notification,data+breach+response,Identity+Theft,Identity+Theft+Prevention,ProtectMyID&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/03/Privacy_hands.jpg"><img class="aligncenter size-full wp-image-1033" title="Privacy_hands" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/03/Privacy_hands.jpg" alt="" width="425" height="282" /></a></p>
<p>Customers see a data breach and the loss of their personal data as a threat to their security and finances, and with good reason. Identity theft occurs every four seconds in the United States, according to figures from the Federal Trade Commission.</p>
<p>As consumers become savvier about protecting their personal data, they expect companies to do the same. And to go the extra mile for them if a data breach occurs. That means providing protection that holds up under scrutiny. Protection that offers peace of mind, not just in the interim but years down the line.</p>
<p>The stronger the level of protection you provide to individuals affected in a breach, the stronger their brand loyalty. Just like with any product, consumers can tell the difference between valid protection products that work and ones that just don’t.</p>
<p>Experian® Data Breach Resolution takes care to provide the former, protection that works for your customers or employees affected in a breach and that reflects positively on you, as the company providing the protection.</p>
<p>Experian’s <a title="ProtectMyId Elite" href="http://www.experian.com/data-breach/identity-theft-monitoring.html" target="_blank"><span style="text-decoration: underline;">ProtectMyID® Elite</span></a> or <a title="ProtectMyId Alert" href="http://www.experian.com/data-breach/protectmyid-alert.html" target="_blank"><span style="text-decoration: underline;">ProtectMyID Alert</span></a> provides industry-leading identity protection and, now, extended fraud resolution care. ExtendCARE™ now comes standard with every ProtectMyID data breach redemption membership, at no additional cost to you or the member.</p>
<p>With ExtendCARE, the <a title="Identity theft resolution" href="http://www.experian.com/data-breach/data-compromise.html" target="_blank"><span style="text-decoration: underline;">identity theft resolution</span></a> portion of ProtectMyID remains active even when the full membership isn’t. ExtendCARE allows members to receive personalized assistance, not just advice, from an Identity Theft Resolution Agent. This high level of assistance is available any time identity theft occurs after individuals redeem their ProtectMyID memberships.</p>
<p>Extended protection from a global leader like Experian can put consumers’ minds at ease following a breach. If we can help you with pre-breach planning or data breach resolution, please contact us at 1 866 751 1323 or <a href="mailto:databreachinfo@experian.com?subject=Experian.com%20Contact%20Us%20Request">databreachinfo@experian.com</a>.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="ExtendCare by Experian" href="http://www.experian.com/data-breach/data-compromise.html?WT.srch=ecd_dbres_blog_030512_article ">Learn more about ExtendCare™</a> and see how Experian&#8217;s Fraud Resolution Agents can help you! </div></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/03/05/extended-fraud-resolution-is-the-new-standard/&via=Experian_DBR&text=Extended fraud resolution is the new standard&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F03%2F05%2Fextended-fraud-resolution-is-the-new-standard%2F&amp;title=Extended%20fraud%20resolution%20is%20the%20new%20standard" id="wpa2a_16"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/03/05/extended-fraud-resolution-is-the-new-standard/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>