<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; Data Policy</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/tag/data-policy/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>&#8216;Tis the season for data privacy</title>
		<link>http://www.experian.com/blogs/data-breach/2012/01/24/tis-the-season-for-data-privacy/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/01/24/tis-the-season-for-data-privacy/#comments</comments>
		<pubDate>Tue, 24 Jan 2012 22:10:50 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Business identity theft]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Policy]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[Social media policy]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=927</guid>
		<description><![CDATA[As our world becomes ever smaller and more networked, Data Privacy Day provides information to consumers about the ways in which personal information is collected, stored, used and shared. The international privacy promotion also helps businesses understand the laws and regulations to which they’re subjected and offers guidance about how to best shield themselves from risks. ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F01%2F24%2Ftis-the-season-for-data-privacy%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Business+identity+theft,cyber+crime,Cyber+Security,Data+Breach,Data+Policy,data+privacy,Data+Security,Identity+Theft,Identity+Theft+Prevention,PII,Social+media+policy&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/01/dataFirewall.jpg"><img class="aligncenter size-full wp-image-935" title="dataFirewall" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/01/dataFirewall.jpg" alt="Data firewall" width="448" height="336" /></a></p>
<p>&nbsp;</p>
<p>It’s that time of year again when people near and far get ready to celebrate the most wonderful holiday of them all.</p>
<p>OK, perhaps it isn’t exactly Christmas, but <a title="Data Privacy Day Organization Website" href="http://www.staysafeonline.org/dpd" target="_blank" class="broken_link" rel="nofollow">Data Privacy Day</a> &#8211; observed on January 28th in 2012 – is no less a celebration; it’s just that this one is designed to promote best practices and awareness around privacy.  The “holiday” was begun in Europe in 2007 and continues to be observed in 30 countries as Data Protection Day.  In the U.S., National Data Privacy Day is managed by the National Cyber Security Alliance (NCSA), a non-profit public-private partnership which estimates that through media and other activities its messages regarding cybersecurity reached 175,000,000 people last year, all in the service of promoting a digital society that can best leverage the five c’s: content, community, communication, commerce and connectivity.</p>
<p>As our world becomes ever smaller and more networked, Data Privacy Day provides information to consumers about the ways in which <a title="Blog about PII" href="http://www.experian.com/blogs/data-breach/2011/09/27/ensuring-the-security-of-personal-identifiable-information/" target="_blank">personal information</a> is collected, stored, used and shared. The international privacy promotion also helps businesses understand the laws and regulations to which they’re subjected and offers guidance about how to best shield themselves from <a title="2011 Breach Overview" href="http://www.experian.com/blogs/data-breach/2011/12/20/year-of-the-breach-2011-in-review/" target="_blank">risks</a>.  Above all, the event is designed to foster a dialogue between different entities – citizens, private organizations and public institutions – about how to balance innovation, progress and growth with the need for privacy protection.</p>
<p>Since privacy is our shared responsibility, how can you contribute to this security festivity?  Train your employees, or consider hosting an event or sponsoring NPD.  If you have kids or teach them, turn to the Teens and Young Adults page, the Parents and Kids page, or the Educators page, which offer guidelines such as how to update your <a title="HOw to update facebook privacy settings" href="http://computer.howstuffworks.com/internet/tips/how-to-update-your-facebook-privacy-settings.htm" target="_blank" class="broken_link" rel="nofollow">Facebook privacy settings</a>, resources such as videos on how to protect your personal information and privacy, as well as <a title="Safetyweb" href="http://www.safetyweb.com/" target="_blank" class="broken_link" rel="nofollow">your children&#8217;s</a>.  Data Privacy Day activities will include presentations, conferences, technology demonstrations, webpage and video competitions, instructional videos, workshops, and regional events, so there are plenty of ways to get involved; for more information, turn to  <a title="Data Privacy Day Website" href="http://www.dataprivacyday.org" target="_blank" class="broken_link" rel="nofollow">www.dataprivacyday.org</a>.</p>
<p>And remember to stay tuned to Experian’s Data Breach Resolution blog, where every day is data privacy day.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/01/24/tis-the-season-for-data-privacy/&via=Experian_DBR&text='Tis the season for data privacy&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/01/24/tis-the-season-for-data-privacy/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Avoiding holiday scams</title>
		<link>http://www.experian.com/blogs/data-breach/2011/12/06/avoiding-holiday-scams/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/12/06/avoiding-holiday-scams/#comments</comments>
		<pubDate>Tue, 06 Dec 2011 17:24:26 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Policy]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[smishing]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=872</guid>
		<description><![CDATA[With the flood of online shoppers comes the accompanying tidal wave of fraudsters washing over the cheerful holiday landscape.  Hidden behind the online mistletoe, cyber-thieves lurk with seasonal scams, virtual Scrooges with plans to spoil holiday shopping for consumers and retailers.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F12%2F06%2Favoiding-holiday-scams%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,cyber+crime,Cyber+Security,Data+Breach,Data+Policy,data+privacy,hackers,Identity+Theft+Prevention,PII,smishing&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/holiday-1210_intro_390x220.jpg"><img class="size-full wp-image-873 aligncenter" title="holiday 1210_intro_390x220" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/holiday-1210_intro_390x220.jpg" alt="" width="390" height="220" /></a></p>
<p>With the flood of online shoppers comes the accompanying tidal wave of fraudsters washing over the cheerful holiday landscape.  Hidden behind the online mistletoe, cyber-thieves lurk with seasonal scams, virtual Scrooges with plans to spoil holiday shopping for consumers and retailers.</p>
<p>Here, according to <a rel="nofollow" href="http://blogs.mcafee.com/consumer/consumer-threat-alerts/holidays-are-high-time-for-cybercrime" target="_blank" class="broken_link">McAfee</a>, are 12 common holiday scams to beware of:</p>
<p><strong>1. </strong><strong>iPad scams</strong>.  Watch out for bogus offers for free iPads on social media sites and via spam.</p>
<p><strong> </strong></p>
<p><strong>2. </strong><strong>“Help! I’ve been robbed” scam. </strong>Fraudsters send emails appearing to come from the account of friends which state that they’ve been robbed while traveling abroad and need money to be wired in order to get home.</p>
<p><strong> </strong></p>
<p><strong>3. </strong><strong>Fake gift cards. </strong>With these scams, cybercriminals promise fake <a href="http://www.experian.com/blogs/data-breach/2011/03/22/protecting-your-business-from-gift-card-fraud/" target="_blank">gift cards</a> in exchange for personal information that can be used for <a href="http://www.experian.com/blogs/data-breach/2011/01/04/identity-theft-protection-insights/" target="_blank">identity theft</a>.</p>
<p><strong> </strong></p>
<p><strong>4. </strong><strong>Holiday</strong><strong> job offers. </strong>Fake, high-paying, work at home jobs are offered in exchange for <a href="http://www.experian.com/blogs/data-breach/2011/09/27/ensuring-the-security-of-personal-identifiable-information/" target="_blank">personal information</a>.</p>
<p><strong> </strong></p>
<p><strong>5. </strong><strong>“Smishing.” </strong>Scammers “phish” via text message, or <a href="http://www.experian.com/blogs/data-breach/2010/12/21/mobile-smishing-attacks-are-on-the-rise/" target="_blank">smish</a>, often posing as a bank or online retailer requesting personal information to address a problem with a target’s account.</p>
<p><strong> </strong></p>
<p><strong>6. </strong><strong>Holiday</strong><strong> rental scams.</strong> Fake, attractive rental properties at low prices are advertised on phony websites in order to lure deposits via wire transfer.</p>
<p><strong> </strong></p>
<p><strong>7. </strong><strong>Recession scams</strong>.  Financial “help” is offered to targets in the form of pay-in-advance credit schemes and pre-qualified low-interest loans, all in exchange for an upfront processing free.</p>
<p><strong> </strong></p>
<p><strong>8. </strong><strong>Grinch-like Greetings. </strong>Fake e-cards are loaded with links to computer viruses and other malware.</p>
<p><strong> </strong></p>
<p><strong>9. </strong><strong>Low price traps. </strong>Auction sites and phony websites are used to offer too-good-to-be-true prices on holiday gifts; the scammers walk away with information and/or money.</p>
<p><strong> </strong></p>
<p>10.  <strong>Charity scams. </strong>Solicitations for phony charities play on the spirit of holiday giving and philanthropic generosity.</p>
<p><strong> </strong></p>
<p><strong>11. </strong><strong>Dodgy holiday downloads.</strong> Watch out for holiday-themed jingles, screensavers and animations distributed via downloads, spam or dubious websites – they could contain malware.</p>
<p><strong> </strong></p>
<p><strong>12. </strong><strong>Hotel and airport Wi-Fi. </strong>During this season of high travel, Wi-Fi hotspots are criminal hangouts, with scammers eager to hack into unprotected networks.</p>
<p><strong> </strong></p>
<p>This holiday season, make sure that you, your employees and your customers are on high alert for the seasonal scams that turn up with the regularity of fruitcake…and are just as unwanted.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/12/06/avoiding-holiday-scams/&via=Experian_DBR&text=Avoiding holiday scams&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/12/06/avoiding-holiday-scams/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Data breaches make the hospitality industry less hospitable</title>
		<link>http://www.experian.com/blogs/data-breach/2011/11/16/data-breaches-make-the-hospitality-industry-less-hospitable/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/11/16/data-breaches-make-the-hospitality-industry-less-hospitable/#comments</comments>
		<pubDate>Wed, 16 Nov 2011 18:00:33 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Consumer fraud]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[Data Policy]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[Security Breaches]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=867</guid>
		<description><![CDATA[According to a new report by British insurance firm Willis Group Holdings, insurance claims for data theft worldwide jumped 56% last year, with the largest share of those attacks - 38% - targeting hotels, reports and tour companies.
Why are hackers increasingly making themselves at home in the hospitality sector?  ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F11%2F16%2Fdata-breaches-make-the-hospitality-industry-less-hospitable%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Consumer+fraud,Data+Breach,data+breach+response,Data+Policy,Data+Security,Identity+Theft+Prevention,Security+Breaches&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/11/travel.jpg"><img class="aligncenter size-full wp-image-868" title="Travel destination" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/11/travel.jpg" alt="Palm trees over a clear blue ocean and white sand" width="557" height="417" /></a></p>
<p>The tourism industry may be bouncing back from the worst of the recession, but occupancy, unfortunately, isn’t the only thing on the rise.  So are <a href="http://www.experian.com/data-breach/data-breach-information.html" target="_blank">data breaches</a>.</p>
<p>According to a new report by British insurance firm Willis Group Holdings, insurance claims for data theft worldwide jumped 56% last year, with the largest share of those attacks &#8211; 38% &#8211; targeting hotels, reports and tour companies.</p>
<p>Why are <a href="http://www.experian.com/blogs/data-breach/2011/10/11/cyberdefense-without-coffee-breaks/" target="_blank">hackers</a> increasingly making themselves at home in the hospitality sector?</p>
<p>According to <a title="Hotel News Now" rel="nofollow" href="http://www.hotelnewsnow.com/Articles.aspx/3329/Hotel-data-breaches-the-result-of-basic-failures-within-industry" target="_blank" class="broken_link">hospitality experts</a>, the reasons are multi-fold:</p>
<p>1.    Labor cutbacks.  Given the recessionary climate, hotels have reduced staff and are trying to do more with less.  While the lean and mean approach may help hospitality businesses bolster bottom lines, it hurts the industry’s front line defenses against hackers.</p>
<p>2.    Software and equipment reductions.  While hotels ride out the recession, security maintenance, implementation and upgrades fall lower in the priority checklist, creating an easy welcome mat for fraudsters.</p>
<p>3.    Multiple entry points.  Customers book hotels through hotel websites, online travel reservation portals, phone calls, email, postal mail, and in-person with concierges.  Each channel offers its own risks for <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">data breaches</a> and must be individually addressed.</p>
<p>4.    Large access to <a href="http://www.experian.com/data-breach/data-breach-security.html" target="_blank">personal data</a>.  The hospitality industry keeps massive amounts of personal data on file for years and can sometimes lose track of what they have stored and where – all within databases that may be far less than bullet-proof.</p>
<p>5.    Guest room computers with flimsy protection.  Those networked desktops that hotels sometimes provide for guests can be so helpful…and harmful.  Often these computers are riddled with viruses or hiding bits and bytes of old customer data.</p>
<p>6.    Insecure cultures.  Even in the best of times, much of the hospitality industry simply doesn’t prioritize security as it should.  By creating business cultures that don’t sufficiently respect privacy, hotels are jeopardizing the trust of their customers.</p>
<p>Given that hackers have identified the hospitality sector as a soft target, what can hotels do to keep these unwanted guests out?  Here are some tips from industry watchdogs:</p>
<ol>
<li>Minimize data collection.  If you don’t need it, don’t collect it.</li>
<li>Understand and comply with PCI-DSS.  Make sure your business is completely aware of its “cardholder data environment” and is providing appropriate protections.</li>
<li>Find and digitally shred unneeded information.  Old, forgotten data is dangerous. Don’t be “data blind” – eliminate what you no longer need.</li>
<li>Simplify your reports.  For example, don’t offer up social security numbers if not needed.</li>
<li>Limit access.  Employees should be on a “need to know” basis with PCI and HR data.</li>
<li>Split up your network.  Create electronic firewalls that limit the spread of viruses and attacks.</li>
<li>Encrypt. Proper encryption renders hacked data unusable.</li>
<li>Understand your network.  Review network logs for unauthorized activity, and make sure your security professionals do, too.</li>
<li>Don’t put security in the ghetto.  Security isn’t just for IT professionals; make sure your entire organization creates and respects a culture of privacy that prioritizes security as the basis for all of its operations</li>
</ol>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/11/16/data-breaches-make-the-hospitality-industry-less-hospitable/&via=Experian_DBR&text=Data breaches make the hospitality industry less hospitable&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/11/16/data-breaches-make-the-hospitality-industry-less-hospitable/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Warning: Medical data breaches are on the rise</title>
		<link>http://www.experian.com/blogs/data-breach/2010/09/07/warning-medical-data-breaches-are-on-the-rise/</link>
		<comments>http://www.experian.com/blogs/data-breach/2010/09/07/warning-medical-data-breaches-are-on-the-rise/#comments</comments>
		<pubDate>Tue, 07 Sep 2010 23:22:15 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Data Policy]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[Identity Theft Resource Center]]></category>
		<category><![CDATA[Medical Data Breach]]></category>
		<category><![CDATA[PHI]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=36</guid>
		<description><![CDATA[According to a recent study by the Identity Theft Resource Center, data breaches in the healthcare sector are occurring at a higher rate than in other industries.  The study found that of the 385 data breaches that occurred in the U.S. in the first half of 2010, 30% of those affected were healthcare providers.  In comparison, data breaches reported in banking and other financial institutions for the same time period totaled 10%.

What is the cause of this large discrepancy between industries?]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2010%2F09%2F07%2Fwarning-medical-data-breaches-are-on-the-rise%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Policy,Fraud,healthcare,Identity+Theft+Resource+Center,Medical+Data+Breach,PHI&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2010/09/Medical-Files-2010-09-07-at-10.40.38-PM.png"><img class="size-full wp-image-58 alignnone" title="Medical Files 2010-09-07 at 10.40.38 PM" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2010/09/Medical-Files-2010-09-07-at-10.40.38-PM.png" alt="" width="487" height="325" /></a></p>
<p>According to a recent study by the <a href="http://www.idtheftcenter.org/index.html" target="_blank" class="broken_link" rel="nofollow"><span style="text-decoration: underline;">Identity Theft Resource Center</span></a>, <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">data breaches</a> in the healthcare sector are occurring at a higher rate than in other industries.  The study found that of the 385 data breaches that occurred in the U.S. in the first half of 2010, 30% of those affected were healthcare providers.  In comparison, data breaches reported in banking and other financial institutions for the same time period totaled 10%.</p>
<p>What is the cause of this large discrepancy between industries?  According to commentary provided by<a href="http://www.esecurityplanet.com/trends/article.php/3896676/Data-Breaches-Continue-to-Plague-Health-Care-Orgs.htm" target="_blank" class="broken_link" rel="nofollow"> <span style="text-decoration: underline;">eSecurity Planet</span></a>, the increase may be due to the many different types of workers that have access to areas in healthcare organizations buildings where sensitive data is stored. This unrestricted access provides an opportunity for unauthorized employees to access laptops, USB drives or desktops with sensitive information from areas that are far less secure than at a bank or other financial institutions.</p>
<p>This sharp increase has caught the attention of the US Congress that is set to approve $1.7 billion to <span style="text-decoration: underline;"><a href="http://www.bloomberg.com/news/2010-08-06/government-fraud-strike-forces-to-expand-under-obama-spending-plans.html" target="_blank" class="broken_link" rel="nofollow">fight healthcare fraud</a></span>. A large portion of that spend will go towards creating fraud “task forces” in up to 20 cities across the U.S. Watchdog groups and patient privacy advocates are also putting pressure on healthcare organizations to protect patient’s medical records and personal information especially as patient records become digital and are stored by third parties.</p>
<p>Deterring and detecting data breach threats does not happen by chance.  Now more than ever, it is important for healthcare companies to take advantage of proven data security solutions and to develop policies, like those used in other industries, to help protect patient data.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2010/09/07/warning-medical-data-breaches-are-on-the-rise/&via=Experian_DBR&text=Warning: Medical data breaches are on the rise&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2010/09/07/warning-medical-data-breaches-are-on-the-rise/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Does your company have a wireless device data policy in place?</title>
		<link>http://www.experian.com/blogs/data-breach/2010/09/07/does-your-company-have-a-wireless-device-data-policy-in-place/</link>
		<comments>http://www.experian.com/blogs/data-breach/2010/09/07/does-your-company-have-a-wireless-device-data-policy-in-place/#comments</comments>
		<pubDate>Tue, 07 Sep 2010 21:12:50 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Policy]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[iPad]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[standards]]></category>
		<category><![CDATA[wireless device]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=24</guid>
		<description><![CDATA[As more business users work remotely and travel the use of wireless devices has become a necessity in the workplace to access data. However, using wireless devices presents new challenges to keep transmitted and stored data secure. ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2010%2F09%2F07%2Fdoes-your-company-have-a-wireless-device-data-policy-in-place%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Compliance,Cyber+Security,Data+Breach,Data+Policy,Data+Security,iPad,PII,standards,wireless+device&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2010/09/iPad3.jpg" target="_blank"><img class="size-full wp-image-39 alignnone" title="iPad3" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2010/09/iPad3.jpg" alt="" width="530" height="270" /></a></p>
<p>Smart phones and other wireless devices are increasingly popular among individual and business users with a 64% year over year market share growth, according to <a href="http://canalys.com/pr/2010/r2010081.html" target="_blank" class="broken_link" rel="nofollow">Canalys</a>.  As more business users work remotely and travel the use of wireless devices has become a necessity in the workplace to access data. However, using wireless devices presents new challenges to keep transmitted and stored data secure.</p>
<p>Earlier this year, it was<a href="http://" target="_blank"> reported</a> that several senior level Washington DC politicians purchased <a href="http://" target="_blank">iPads</a> and individually set up their wireless accounts using their service provider’s account verification process.  A security company identified a <a href="http://security.goatse.fr/" target="_blank" class="broken_link" rel="nofollow">data security flaw</a> and was able to hack the verification process.  This clever hack resulted in the theft of over 100,000 email addresses and unique numbers associated with the devices purchased.  Affected politicians included White House Chief of Staff, Rahm Emanuel and New York City Mayor, Michael Bloomberg.</p>
<p>Individual email addresses and device serial numbers may not sound significant at first glance.  However, nefarious individuals can leverage this data to guess more relevant information such as provider account number&#8230;which is linked to personally identifiable information (PII) of the end user.</p>
<p>Defining wireless device use standards is paramount. Corporate executive leadership must enable the communication between leaders in the Compliance, IT and consumer- facing teams to develop standards for device adoption and for how sensitive data is handled or distributed.  Policies and standards must be in place to help prevent the occurrence of a <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">data breach</a>.</p>
<p>What is your company doing to define wireless device usage and data standards?</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2010/09/07/does-your-company-have-a-wireless-device-data-policy-in-place/&via=Experian_DBR&text=Does your company have a wireless device data policy in place?&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2010/09/07/does-your-company-have-a-wireless-device-data-policy-in-place/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>