Tag: data breaches

Loading...
Stress, Apathy and Winning by Default: How Consumers R...

Data breach notification letters serve multiple purposes. They ensure a breached company is compliant with data breach notification laws, they alert consumers to the breach and their involvement in it, they can warn customers of potential identity theft risks and educate them on how to cope with those risks....

Read More Stress, Apathy and Winning by Default: How Consumers Respond to Data Breach Notification Letters
Views on Consumer Reactions

to Data Breaches...

Q&A with Experian® Data Breach Resolution Vice President, Michael Bruemmer. The Ponemon Institute recently released a survey report—‘‘The Aftermath of a Mega Data Breach: Consumer Sentiment’’—sponsored by Experian Data Breach Resolution. Bloomberg BNA Privacy & Security Law Report Senior Legal Editor Donald G. Aplin posed a series of questions...

Read More Views on Consumer Reactions

to Data Breaches

The Worst Things You can Say or Do in a Breach Notific...

When a data breach occurs, laws and industry regulations, dictate when and if you need to notify consumers whose data might have been compromised. However, many consumers would also probably argue that you’re morally obligated, to notify them of data loss; they want you to tell them of the...

Read More The Worst Things You can Say or Do in a Breach Notification Letter
A Look Back at HIPAA’s Data Breach Security and Protec...

For healthcare businesses, the wait is over. When the Department of Health and Human Services’ (HHS) released its Omnibus Rule on January 17, 2013 amending the HIPAA privacy and data breach protection laws, it capped a 17 year evolution of medical cyber security regulations. In 1996 The Health Insurance...

Read More A Look Back at HIPAA’s Data Breach Security and Protection History
Cyber Security Requires a Three-stage Approach to Data...

Private and public businesses are favored targets for hackers; in fact, in 2012, businesses accounted for more than a third of all data breaches in the U.S., according to the Identity Theft Resource Center (ITRC). Perpetrated against companies large and small, these breaches compromised more than 4.6 million records....

Read More Cyber Security Requires a Three-stage Approach to Data Breach Prevention
Advances in Cyber Insurance Risk Management Services H...

Written by: Rick Betterley, President, Betterley Risk Consultants Insurance against data loss has developed rapidly to protect organizations from the economic consequences of a data breach. Insurance companies have broadened their coverage to include not only the cost of notifying and monitoring affected persons, but also costs such as...

Read More Advances in Cyber Insurance Risk Management Services Help Protect Against Data Loss – But More Can Be Done
Reborn CISPA cyber security bill experiences déjà vu...

Backed by the momentum created by the signing of President Obama’s Executive Order earlier this year regarding the U.S. national cyber security policies, the Cyber Information Sharing and Protection Act (CISPA) was reintroduced to the House by its authors Reps. Mike Rogers and Dutch Ruppersberger, heads of the House...

Read More Reborn CISPA cyber security bill experiences déjà vu
Cyber Insurance Adds to Cyber Security...

The purpose of any type of insurance is to protect your most valuable assets so in order to combat the prevalence of cyber attacks and data breaches, an increasing number of businesses in the health-care, financial services and technology industries have purchased cyber insurance policies to protect themselves from...

Read More Cyber Insurance Adds to Cyber Security
Get up to speed on cyber insurance and breach response...

How does cyber insurance factor into data breach response? Get the answer – and many more insights – at the NetDiligence® 2013 Cyber Risk & Privacy Liability Forum on June 6-7 in Philadelphia. We’ll see you there! During the forum, be sure to visit Experian® to see everything we...

Read More Get up to speed on cyber insurance and breach response at the NetDiligence Forum in Philly
IAPP Panel Discusses BYOD and the “Technology Divorce”...

As mobile technology continues to dominate the workplace, look for more organizations to adopt “bring your own device” programs to stay competitive.  If your organization falls into this category, how will you protect your data? And just as importantly, how will you control your employees’ activities on their devices?...

Read More IAPP Panel Discusses BYOD and the “Technology Divorce”
Controversial Cyber Security Bill Passes The House...

Despite President Obama’s January signing of an Executive Order (EO) which outlines national cyber security policies in protecting U.S. companies and government agencies against cyber threats, the controversial Cyber Intelligence Sharing and Protection Act (CISPA) was passed in a 288-127 House vote sending it now to the Senate.¹ CISPA...

Read More Controversial Cyber Security Bill Passes The House