<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; Federal Trade Commission</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/tag/federal-trade-commission/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>Online holiday shopping is also big business for fraudsters</title>
		<link>http://www.experian.com/blogs/data-breach/2012/12/18/online-holiday-shopping-is-also-big-business-for-fraudsters/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/12/18/online-holiday-shopping-is-also-big-business-for-fraudsters/#comments</comments>
		<pubDate>Tue, 18 Dec 2012 18:47:08 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Consumer fraud]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Federal Trade Commission]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[online shopping]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1901</guid>
		<description><![CDATA[According to EMC&#8217;s November 2012 fraud report, online holiday shopping is projected to account for 24% of the year’s total  e-commerce sales which is good news for retailers and unfortunately, it can also be good news for online con artists.  If 2012 is anything like 2011, retailers will need to increase their data protection and security [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F12%2F18%2Fonline-holiday-shopping-is-also-big-business-for-fraudsters%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Consumer+fraud,Cyber+Security,Data+Breach,Data+Security,Federal+Trade+Commission,hackers,Identity+Theft,online+shopping&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/12/online-shopping.jpg"><img class="aligncenter  wp-image-1905" title="online-shopping" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/12/online-shopping.jpg" alt="" width="476" height="316" /></a></p>
<p>According to EMC&#8217;s November 2012 fraud report, online holiday shopping is projected to account for 24% of the year’s total  e-commerce sales which is good news for retailers and unfortunately, it can also be good news for online con artists.  If 2012 is anything like 2011, retailers will need to increase their <a href="http://www.experian.com/blogs/data-breach/2012/07/31/three-data-protection-strategies-to-catch-a-phish/">data protection and security</a> measures in order to avoid illegal online activity.  Of the 1.4 billion dollars spent in online sales during 2011’s holiday shopping season (November 1 to December 31), $82 million of those dollars were identified as fraudulent, resulting in a 219% increase from 2010.  Cyber Monday alone accounted for $2.5 million of online fraud.</p>
<p>Most web-based fraud activity is due to stolen credit cards and since <a href="http://www.experian.com/blogs/data-breach/2012/08/21/three-things-you-should-never-do-to-identity-theft-victims/">identity theft</a> is at an all time high, online merchants of all sizes need to implement fraud protection procedures and be proactive in watching for signs of unscrupulous activity.  Early detection is the key to stopping con artists who like to prey on new, inexperienced online businesses.  However, if they discover a merchant has implemented active data security procedures, fraudsters generally won’t waste their time and will most likely move on to their next victim.  The best way for businesses to protect themselves from fraud is to be diligent in watching out for signs of suspicious activity.  These include bulk orders for items that are not usually bought in bulk, orders for multiple high end items, international orders and several orders placed by the same person within a short time.  Con artists try to make as many purchases as possible before a fraud alert is sent to the real owner so they tend to order as much merchandise as they can.</p>
<p>Although it’s impossible to erase online credit card fraud, here are several strategies to reduce it:</p>
<ol start="1">
<li>Use an Address Verification Service (AVS) to make sure the billing address entered online matches the cardholder’s billing information. Institute a policy that merchandise will not ship unless the addresses match.</li>
<li>Always ask for the Card Verification Number (CVN) on all credit card orders. The number must be read from the actual card so more than likely the person has the card in his possession. Although it’s not a guarantee that he is its rightful owner, this step provides a small measure of protection.</li>
<li>Send a confirmation email or letter to customers when you send an item telling them their order has shipped and when they can expect it to appear on their bill. This can help flag any illegal activity and enable the customer to report credit fraud to the proper authorities before the perpetrator has a chance to do any further credit damage. It will also help businesses to reduce complaints and chargebacks from people who sometimes simply forget they placed an order.</li>
</ol>
<p>Retailers should keep in mind that once an order has been sent, it is very difficult to regain any loss so prevention is the number one way to combat online fraud.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/12/18/online-holiday-shopping-is-also-big-business-for-fraudsters/&via=Experian_DBR&text=Online holiday shopping is also big business for fraudsters&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F12%2F18%2Fonline-holiday-shopping-is-also-big-business-for-fraudsters%2F&amp;title=Online%20holiday%20shopping%20is%20also%20big%20business%20for%20fraudsters" id="wpa2a_2"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/12/18/online-holiday-shopping-is-also-big-business-for-fraudsters/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Quick glance: data breach litigation &amp; legislation in 2012</title>
		<link>http://www.experian.com/blogs/data-breach/2012/01/10/quick-glance-data-breach-litigation-legislation-in-2012/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/01/10/quick-glance-data-breach-litigation-legislation-in-2012/#comments</comments>
		<pubDate>Tue, 10 Jan 2012 16:53:34 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach notification fatigue]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Federal Trade Commission]]></category>
		<category><![CDATA[Security Breaches]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=912</guid>
		<description><![CDATA[With the recent spate of data breaches and accompanying class action lawsuits, businesses have constant reminders that an ounce of prevention is worth a pound of cure. The best way to protect your business against the high costs of data breaches is to ensure your security practices and fraud resolution plans are strongly built to ward off malicious attacks and the complications that follow.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F01%2F10%2Fquick-glance-data-breach-litigation-legislation-in-2012%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+notification+fatigue,breach+prevention,Data+Breach+Notification,data+breach+response,data+privacy,Federal+Trade+Commission,Security+Breaches&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>It was only a matter of time before a flood of class action lawsuits began to wash over breached companies. In general, these suits allege that a company: 1) did not adequately protect the sensitive data entrusted to it and 2) did not notify consumers of the breach in a timely enough manner. In 2011, after one of the biggest breaches of the year went public, it took just one day for the first class action lawsuit to be lodged.</p>
<p>The avalanche of recent breaches has been worrisome for consumers, causing lawyers, as well as lawmakers, to take note. Moving into 2012, businesses will want to carefully watch the changing landscape of litigation and legislation.<br />
Two recently submitted bills would require companies to inform affected customers, the <a title="Develop a data breach response plan" href="http://www.experian.com/blogs/data-breach/2011/02/22/develop-a-breach-response-plan-now-to-be-ready-to-efficiently-address-a-breach-as-soon-as-it-is-reported/" target="_blank">Federal Trade Commission</a> and law authorities of a data loss within 48 hours of completing a breach assessment.</p>
<p>No matter the outcome of these bills, companies that delay making their breaches public will continue to face the consequences. In 2011, a large financial institution found itself in hot water after waiting weeks to notify customers of a breach. The controversial delay prompted a leading industry group representing the country’s largest financial institutions to testify before congress. The testimony suggested that banks should immediately notify federal officials and affected customers of a breach.</p>
<p>While the outcome of recent litigation remains to be seen, many lawyers expect these suits to inevitably increase in size – and rewards. To date, Internet privacy-related lawsuits have yet to yield the hefty settlements of securities fraud cases. Still, with the escalating breadth of data breaches, higher profile law firms, ones known for mounting successful security fraud litigation on behalf of shareholders, are getting involved.</p>
<p>The challenge for plaintiffs’ lawyers in security breach cases is not in proving liability but establishing damages. Judges must determine whether the compromise of personal data represents a loss of value or if there should be additional proof of tangible harm.</p>
<p>With the recent spate of data breaches and accompanying class action lawsuits, businesses have constant reminders that an ounce of <a title="Data breaches - to prepare or not to prepare?" href="http://www.experian.com/blogs/data-breach/2011/05/17/data-breaches-%E2%80%93-to-prepare-or-not-to-prepare-the-answer-is-simple/" target="_blank">prevention</a> is worth a pound of cure. The best way to protect your business against the high costs of data breaches is to ensure your<a title="Data Breach homepage" href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank"> security practices and fraud resolution</a> plans are strongly built to ward off malicious attacks and the complications that follow.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/01/10/quick-glance-data-breach-litigation-legislation-in-2012/&via=Experian_DBR&text=Quick glance: data breach litigation & legislation in 2012&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/01/10/quick-glance-data-breach-litigation-legislation-in-2012/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Child identity theft: A new frontier for fraudsters</title>
		<link>http://www.experian.com/blogs/data-breach/2011/08/09/child-identity-theft-a-new-frontier-for-fraudsters/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/08/09/child-identity-theft-a-new-frontier-for-fraudsters/#comments</comments>
		<pubDate>Tue, 09 Aug 2011 19:01:15 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Child Identity Theft]]></category>
		<category><![CDATA[Credit report monitoring]]></category>
		<category><![CDATA[Federal Trade Commission]]></category>
		<category><![CDATA[Identity Theft Resource Center]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=710</guid>
		<description><![CDATA[A recent Federal Trade Commission discussion, "Stolen Futures: A Forum on Child Identity Theft,” presented a valuable opportunity to galvanize industry experts and public leaders around this increasing privacy threat.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F08%2F09%2Fchild-identity-theft-a-new-frontier-for-fraudsters%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Child+Identity+Theft,Credit+report+monitoring,Federal+Trade+Commission,Identity+Theft+Resource+Center&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/08/kids2-300x200.jpg"></a><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/08/Children%20Safe.jpg" class="broken_link" rel="nofollow"></a> <a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/08/Child-Identity-Theft.jpg"><img class="aligncenter size-full wp-image-718" title="happy kids" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/08/Child-Identity-Theft.jpg" alt="" width="423" height="283" /></a></p>
<p>You might think you’re pretty savvy when it comes to understanding identity theft.  But what about when identity theft threatens your children?</p>
<p>A recent Federal Trade Commission discussion, &#8220;Stolen Futures: A Forum on Child Identity Theft,” presented a valuable opportunity to galvanize industry experts and public leaders around this increasing privacy threat.  Pop quiz: <a rel="”nofollow” nofollow" href="http://www.familysecure.com/PDFs/FamilySecure.com-InfoBrochure-HighRes_Final.pdf" target="_blank" class="broken_link">did you know</a>….</p>
<ul>
<li>Children are 51 times more likely to become victims of identity theft than adults, with anywhere from 140,000 to 400,000 children affected annually by this crime.</li>
<li>Criminals can easily establish fraudulent credit files in a child’s name and use them for years without detection.</li>
<li>Child identity thefts often aren’t discovered until the youngster applies for a driver’s license, summer job or college loans.</li>
<li>Thieves snatch children’s Social Security numbers and other personal information from day care centers, hospitals, schools, and even sports team applications.</li>
<li>Stolen identities can result in credit damage for years, resulting in denial of college loans, inability to rent an apartment, difficulty in getting hired for a job, confusion around medical records, and driving records attached to a criminal’s name.</li>
</ul>
<p>Children make vulnerable prey for identity thieves, with fresh, unused Social Security numbers that can easily be applied to another person’s birth date and name.  The sad truth is that these crimes are often perpetrated by the victim’s own family, making it difficult for the child (when he’s an adult) or non-offending family members to report the incident.  Foster children are particularly vulnerable since their personal information is passed around from family to family.</p>
<p>Whether the theft was committed by strangers or family, identity theft causes financial as well as emotional suffering for children, especially once they become old enough to fully understand how they were victimized.  The <a rel="”nofollow” nofollow" href="http://www.idtheftcenter.org/artman2/publish/v_fact_sheets/Fact_Sheet_120.shtml" target="_blank" class="broken_link">Identity Theft Resource Center</a> offers helpful fact sheets that explain the process of reporting and repairing credit damage as well as healing the emotional wounds from these crimes.</p>
<p>What can you do to <a rel="”nofollow” nofollow" href="http://articles.baltimoresun.com/2011-05-29/business/bs-bz-ambrose-child-identity-theft-20110529_1_identity-theft-resource-center-social-security-number-privacy-and-identity-protection" target="_blank" class="broken_link">protect your child</a>?</p>
<ul>
<li>Fiercely guard your child’s social security number, only giving it out when absolutely necessary and after you’ve been assured it will be well protected.</li>
<li>Teach your child to protect himself online by keeping his personal information private.</li>
<li>Investigate red flags like debt collectors calling for your child or mail addressed to your child from debt consolidators.</li>
<li>Enroll your child in <a href="http://www.protectmyid.com/" target="_blank" class="broken_link" rel="nofollow">credit report monitoring</a> that will immediately alert you to suspicious activity.</li>
</ul>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/08/09/child-identity-theft-a-new-frontier-for-fraudsters/&via=Experian_DBR&text=Child identity theft: A new frontier for fraudsters&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/08/09/child-identity-theft-a-new-frontier-for-fraudsters/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Is a national data breach notification law finally within reach?</title>
		<link>http://www.experian.com/blogs/data-breach/2011/06/28/is-a-national-data-breach-notification-law-finally-within-reach/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/06/28/is-a-national-data-breach-notification-law-finally-within-reach/#comments</comments>
		<pubDate>Tue, 28 Jun 2011 14:53:32 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[cyber-defense]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[Department of Homeland Security]]></category>
		<category><![CDATA[Federal Trade Commission]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=622</guid>
		<description><![CDATA[The White House recently released a comprehensive cyber-security policy proposal, and with it raised new hopes that a streamlined solution around data breach notification is finally at hand.  ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F06%2F28%2Fis-a-national-data-breach-notification-law-finally-within-reach%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=cyber-defense,Data+Breach+Notification,Department+of+Homeland+Security,Federal+Trade+Commission&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/06/security-breach.jpg"></a></p>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/06/globe-cyberwar_1.jpg"><img class="aligncenter size-full wp-image-657" title="globe-cyberwar_1" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/06/globe-cyberwar_1.jpg" alt="" width="448" height="336" /></a></p>
<p>The White House recently released a comprehensive <a rel="”nofollow” nofollow" href="http://www.whitehouse.gov/omb/legislative_letters" target="_blank" class="broken_link">cyber-security policy proposal</a>, and with it raised new hopes that a streamlined solution around data breach notification is finally at hand.  The desire for such a federal policy, which would supersede the <a href="http://www.experian.com/blogs/data-breach/2011/03/01/get-ready-for-a-new-wave-of-breach-notification-laws/" target="_blank">patchwork quilt of state regulations</a>, has long been expressed – proposals have been bandied about for years but have invariably become bogged down in Congress.  Despite widespread arguments that the mandatory obligations of businesses around data breach notification should be simplified and made uniform across the country, a national law has remained frustratingly elusive.</p>
<p>The release of the Obama administration’s proposal breathes new seriousness of purpose to this effort, which leaders hope will galvanize Congress to push this effort over the hump so that national guidelines finally become law.  The new proposal creates specific requirements around the method and timing of communications about breaches and positions the Federal Trade Commission and state attorneys general as the enforcers of the law, with penalties for violations totaling as much as $1 million.</p>
<p>The proposal has been met with both receptivity and criticism.  Members of the House Committee on the Judiciary Subcommittee on Intellectual Property, Competition, and the Internet, for starters, have various <a rel="”nofollow” nofollow" href="http://www.fiercegovernmentit.com/story/house-subcommittee-criticizes-white-house-cybersecurity-proposal/2011-05-26" target="_blank" class="broken_link">issues</a> with the bill; some claim that enforced standards will hinder economic growth, while others complain that the information sharing portions of the bill that address liability are too broad.  Additional criticism is that nationalization of rules which weaken <a href="http://www.experian.com/blogs/data-breach/2011/03/01/get-ready-for-a-new-wave-of-breach-notification-laws/" target="_blank">state laws</a> will help businesses at the expenses of consumers.</p>
<p>Data breach notification requirements are just one part of the White House proposal, which also includes parameters around cyber-defense and protections for critical infrastructure such as electric grids and financial systems from would-be cyber-terrorists.  The Department of Homeland Security would work closely with states and critical infrastructure businesses to help manage appropriate protections and responses to “<a rel="”nofollow” nofollow" href="http://www.eweek.com/c/a/Security/White-House-Unveils-CyberSecurity-Proposals-to-Guard-Critical-Infrastructure-237236/" target="_blank" class="broken_link">significant cyber-security incidents</a>.”<span id="mce_marker"> </span></p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/06/28/is-a-national-data-breach-notification-law-finally-within-reach/&via=Experian_DBR&text=Is a national data breach notification law finally within reach?   &related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/06/28/is-a-national-data-breach-notification-law-finally-within-reach/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Law vs. Technology: Which stops more breaches?</title>
		<link>http://www.experian.com/blogs/data-breach/2011/06/07/law-vs-technology-which-stops-more-breaches/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/06/07/law-vs-technology-which-stops-more-breaches/#comments</comments>
		<pubDate>Tue, 07 Jun 2011 18:05:25 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[data breach fines]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[Federal Trade Commission]]></category>
		<category><![CDATA[Identity Ecosystem]]></category>
		<category><![CDATA[national data breach law]]></category>
		<category><![CDATA[National Strategy for Trusted Identities in Cyberspace]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=597</guid>
		<description><![CDATA[With the recent rash of highly newsworthy data breaches, headlined by the Sony PlayStation Network breach that impacted 77+ million subscribers, there’s been much hand-wringing over how to best ensure the protection of customer privacy.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F06%2F07%2Flaw-vs-technology-which-stops-more-breaches%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach,data+breach+fines,Data+Breach+Notification,Federal+Trade+Commission,Identity+Ecosystem,national+data+breach+law,National+Strategy+for+Trusted+Identities+in+Cyberspace&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/06/i_haymarket_net_au_features_justice1.jpg"><img class="size-full wp-image-603 alignnone" title="i_haymarket_net_au_features_justice1" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/06/i_haymarket_net_au_features_justice1.jpg" alt="" width="336" height="336" /></a></p>
<p>With the recent rash of highly newsworthy data breaches, headlined by the <a rel="”nofollow” nofollow" href="http://www.businessweek.com/news/2011-05-03/sony-data-breach-exposes-users-to-years-of-identity-theft-risk.html" target="_blank" class="broken_link">Sony PlayStation Network breach</a> that impacted 77+ million subscribers, there’s been much hand-wringing over how to best ensure the protection of customer privacy.  <a rel="”nofollow” nofollow" href="http://blogs.forbes.com/kashmirhill/2011/05/09/how-do-we-deal-with-data-breaches/" target="_blank" class="broken_link">The debate</a> seems to be centered around two different camps: those who believe that the force of law can best bolster security and those who argue that better technology holds the key to data breach freedom.</p>
<p><span style="text-decoration: underline;">Camp #1: The Lawyers</span></p>
<p>While proposals for a <a rel="”nofollow” nofollow" href="http://www.govtrack.us/congress/bill.xpd?bill=h111-2221" target="_blank" class="broken_link">national data breach law</a> have so far failed to gain traction, most states now have laws in place that oblige companies to take certain steps when data breaches impact their customers, including requirements around <a href="http://www.experian.com/blogs/data-breach/2011/03/01/get-ready-for-a-new-wave-of-breach-notification-laws/" target="_blank">breach notification</a>.  Privacy advocates insist that the government needs to become more involved in serving as a national “<a rel="”nofollow” nofollow" href="http://www.nytimes.com/2011/05/08/weekinreview/08bilton.html" target="_blank" class="broken_link">data sheriff</a>,” passing new laws that will force companies to take their security obligations more seriously.  In the meantime, as we <a href="http://www.experian.com/blogs/data-breach/2011/05/31/the-high-cost-of-data-breaches-just-got-higher/" target="_blank">reported recently</a>, the Sony breach in particular has galvanized the Federal Trade Commission to begin levying fines against companies for insufficient security practices that allow data breaches to take place.  The argument for financial penalties against breached companies is that economic spankings will motivate organizations to plug security holes in ways that concern for consumer protection alone has not.</p>
<p><span style="text-decoration: underline;">Camp #2: The Techies </span></p>
<p>While legal roadblocks may have their place, some believe that regulations can only go so far in protecting us.  Factors that make information control nigh impossible, according to <a rel="”nofollow” nofollow" href="http://techland.time.com/2011/05/08/why-your-personal-information-wants-to-be-free/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+timeblogs%2Fnerd_world+%28TIME%3A+Techland%29" target="_blank" class="broken_link">Time</a>’s Jerry Brito, include the proliferation of digitization, the vast scope of the Internet, the scale of communications made possible by the Internet, and the ease of online distribution.  Instead of punitive measures as a path to security, this argument goes, we should accept that data breaches are inevitable and instead focus on harnessing technology to improve security.  Proponents of this approach note, for example, the promise of the Obama Administration’s <a rel="”nofollow” nofollow" href="http://www.nist.gov/nstic/" target="_blank" class="broken_link">National Strategy for Trusted Identities in Cyberspace</a>, which would establish an <a rel="”nofollow” nofollow" href="http://www.nist.gov/nstic/identity-ecosystem.html" target="_blank" class="broken_link">identity ecosystem</a> that would utilize new technologies, policies and standards to help protect and authenticate consumer transactions.</p>
<p>As data breaches become bolder and more destructive, the debate about how to best protect ourselves from this online menace is sure to rage on.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/06/07/law-vs-technology-which-stops-more-breaches/&via=Experian_DBR&text=Law vs. Technology: Which stops more breaches?&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/06/07/law-vs-technology-which-stops-more-breaches/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The high cost of data breaches just got higher</title>
		<link>http://www.experian.com/blogs/data-breach/2011/05/31/the-high-cost-of-data-breaches-just-got-higher/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/05/31/the-high-cost-of-data-breaches-just-got-higher/#comments</comments>
		<pubDate>Tue, 31 May 2011 15:44:22 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[data breach fines]]></category>
		<category><![CDATA[Federal Trade Commission]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=583</guid>
		<description><![CDATA[In an effort to make data breaches even more unpalatable and motivate companies to strengthen their security practices, the Federal Trade Commission is beginning to levy punishments for security holes that invite intrusions.  ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F05%2F31%2Fthe-high-cost-of-data-breaches-just-got-higher%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach,data+breach+fines,Federal+Trade+Commission&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/05/img_0615-7-deadly-sins-2_thumb555.jpg"></a></p>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/05/img_0615-7-deadly-sins-2_thumb5551.jpg"><img class="aligncenter size-full wp-image-588" title="img_0615-7-deadly-sins-2_thumb555" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/05/img_0615-7-deadly-sins-2_thumb5551.jpg" alt="" width="429" height="336" /></a></p>
<p>If you thought that <a href="http://www.experian.com/blogs/data-breach/2011/02/15/10-ways-that-breaches-burn-business/" target="_blank">data breaches were already expensive</a> – what with the manpower and resources needed to issue breach notifications, offer compensatory protection services such as free identity theft protection, identify the source of leaks and tighten up security, and bolster marketing efforts to hang on to customer loyalty – add a new line item to the list.</p>
<p>Fines.</p>
<p>In an effort to make data breaches even more unpalatable and motivate companies to <a href="http://www.experian.com/business-services/data-breach-protection.html" target="_blank">strengthen their security practices</a>, the Federal Trade Commission is beginning to levy punishments for security holes that invite intrusions.  For example, the <a rel="”nofollow” nofollow" href="http://www.pcworld.com/businesscenter/article/226978/ftc_settles_data_breach_charges_against_two_firms.html" target="_blank" class="broken_link">FTC recently settled</a> with two companies, a payroll and HR firm and an immigration law services firm, both of which maintain a great deal of sensitive information about the employees of their business customers, including Social Security numbers.  The organizations were charged with violating federal law by failing to provide reasonable and appropriate measures to protect sensitive data, in spite of the fact that the companies advertised their security measures with claims such as “worry-free safety and reliability.”  As part of the settlements, each firm is required to obtain comprehensive information security programs and independent security audits every other year for 20 years.</p>
<p>Taking a cue from this new practice in the U.S. and other countries, and asserting her deep concern with the large number of recent breaches, <a rel="”nofollow” nofollow" href="http://www.cbc.ca/news/technology/story/2011/05/04/technology-data-breaches-stoddart.html" target="_blank" class="broken_link">Canada’s privacy commissioner</a> also wants to start implementing hefty “attention-getting fines” against firms that have allowed customer data to be compromised through preventable data breaches.</p>
<p>This decision followed news that Canadian lawyers have announced a $1 billion class-action lawsuit as a response to two massive Sony PlayStation Network breaches that exposed the information of 102 million customers.  A <a rel="”nofollow” nofollow" href="http://ingame.msnbc.msn.com/_news/2011/05/03/6577819-sony-declines-to-testify-before-congress-as-1-billion-lawsuit-filed" target="_blank" class="broken_link">U.S. House of Representatives subcommittee</a> is also demanding answers from Sony about the circumstances surrounding these breaches and has scheduled a hearing to address the “threat of data theft to American customers.”</p>
<p>Not all security experts think that punitive measures towards breached organizations help protect customers from data theft, noting that it is akin to fining a store after it has been robbed.  In fact, <a rel="”nofollow” nofollow" href="http://www.networkworld.com/news/2011/042211-data-breach-fines-can-risk.html?page=1" target="_blank" class="broken_link">some think that fines have the opposite effect</a> by deterring companies from reporting data breach incidents in the first place.</p>
<p>As they say, the best defense is a good offense.  Protect your organization from the threat of breaches and expensive regulatory punishments by ensuring that you have a strong and <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">defensible security program</a> in place.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/05/31/the-high-cost-of-data-breaches-just-got-higher/&via=Experian_DBR&text=The high cost of data breaches just got higher&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/05/31/the-high-cost-of-data-breaches-just-got-higher/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Breach notification in three easy steps</title>
		<link>http://www.experian.com/blogs/data-breach/2011/05/10/breach-notification-in-three-easy-steps/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/05/10/breach-notification-in-three-easy-steps/#comments</comments>
		<pubDate>Tue, 10 May 2011 15:16:48 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach requirements]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data loss prevention tools]]></category>
		<category><![CDATA[Ernst and Young]]></category>
		<category><![CDATA[Federal Trade Commission]]></category>
		<category><![CDATA[privacy trends]]></category>
		<category><![CDATA[Wikileaks]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=436</guid>
		<description><![CDATA[In a recent report, Ernst and Young noted that stronger breach notification requirements are among the top privacy trends for 2011.  Governments around the world are enacting or tightening regulations around breach notification, and within the U.S., individual state laws around data breach notification have had a tremendous impact on data security.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F05%2F10%2Fbreach-notification-in-three-easy-steps%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+requirements,Data+Breach+Notification,data+loss+prevention+tools,Ernst+and+Young,Federal+Trade+Commission,privacy+trends,Wikileaks&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/04/hacking_for_password.jpg"></a></p>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/04/hacking_for_password1.jpg"><img class="aligncenter size-full wp-image-445" title="hacking_for_password" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/04/hacking_for_password1.jpg" alt="" width="448" height="299" /></a><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/04/hacking_for_passwordv2.jpg"></a></p>
<p>In a recent report, <a rel="”nofollow” nofollow" href="http://www.ey.com/GL/en/Services/Advisory/IT-Risk-and-Assurance/Top-11-privacy-trends-for-2011---2--Breach-notification-requirements" target="_blank" class="broken_link">Ernst and Young</a> noted that stronger breach notification requirements are among the top privacy trends for 2011.  Governments around the world are enacting or tightening regulations around breach notification, and within the U.S., individual <a href="http://www.experian.com/blogs/data-breach/2011/02/17/data-security-law-in-2011-states-remain-the-center-of-attention/" target="_blank">state laws</a> around data breach notification have had a tremendous impact on data security.    </p>
<p>The dramatic exposures engineered by Wikileaks have made it clear that insiders who have access to sensitive information are often at the center of devastating breach incidents and can – either intentionally or inadvertently – cause tremendous damage.  Training and awareness can be of significant help in preventing accidental employee misuse of information, while technical controls such as <a rel="”nofollow” nofollow" href="http://www.eweek.com/c/a/Security/How-to-Choose-a-Data-Loss-Prevention-Tool-256052/" target="_blank" class="broken_link">data loss prevention tools</a> can combat more sinister efforts to steal information.  Ernst &amp; Young believes that DLP tools will become increasingly popular in 2011, although tools alone won’t solve data breach exposure; they must be accompanied by strong policies and trained staff for effective implementation. </p>
<p>Here’s a quick checklist for how your company can responsibly manage its obligations around breach notification:</p>
<ol>
<li>Develop an <a href="http://www.experian.com/blogs/data-breach/2011/02/22/develop-a-breach-response-plan-now-to-be-ready-to-efficiently-address-a-breach-as-soon-as-it-is-reported/" target="_blank">incident response plan</a> ahead of time so that it can be implemented immediately.  For some businesses, the <a href="http://www.experian.com/blogs/data-breach/2010/12/01/the-danger-of-not-having-a-breach-policy-in-place/" target="_blank">absence of such a plan</a> can turn a breach incident into a fight for the company’s mere survival, so make sure that your business isn’t caught by surprise.  Refer to <a href="http://www.experian.com/assets/data-breach/white-papers/data-security-law-part2.pdf" target="_blank">expert considerations</a> of all the factors that should be included in your detailed plan.</li>
<li>Understand the <a href="http://www.experian.com/blogs/data-breach/2011/03/01/get-ready-for-a-new-wave-of-breach-notification-laws/" target="_blank">breach requirements</a> within your state and specific industry.  Until there is one national standard for all privacy regulations, your business must comply within regional laws or face stiff penalties. </li>
<li>When breaches occur, execute upon your plan quickly and thoroughly.  Once your team determines the type of breach, scope of breach and the customers affected by the breach, you must determine which individuals or businesses need to be notified, if any. <a rel="”nofollow” nofollow" href="http://www.ftc.gov/bcp/edu/microsites/idtheft/business/data-breach.html" target="_blank" class="broken_link">Guidelines from the Federal Trade Commission</a> can help you quickly understand the specific requirements which your data breach demands.</li>
</ol>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/05/10/breach-notification-in-three-easy-steps/&via=Experian_DBR&text=Breach notification in three easy steps &related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/05/10/breach-notification-in-three-easy-steps/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Helpful tips on data breach notification</title>
		<link>http://www.experian.com/blogs/data-breach/2011/01/04/helpful-tips-on-data-breach-notification/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/01/04/helpful-tips-on-data-breach-notification/#comments</comments>
		<pubDate>Tue, 04 Jan 2011 16:56:17 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Congress]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[Federal Trade Commission]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Notification Law]]></category>
		<category><![CDATA[Security Breaches]]></category>
		<category><![CDATA[State Law]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=254</guid>
		<description><![CDATA[When a data breach occurs it is important to understand the breach notification laws in your State and what you have to do to abide by them. After contacting your legal counsel, the next stop you can make is the National Conference of State Legislatures which maintains a list of enacted and proposed security breach [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F01%2F04%2Fhelpful-tips-on-data-breach-notification%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Congress,Data+Breach+Notification,Federal+Trade+Commission,Identity+Theft,Notification+Law,Security+Breaches,State+Law&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>When a data breach occurs it is important to understand the breach notification laws in your State and what you have to do to abide by them. After contacting your legal counsel, the next stop you can make is the <a title="National Conference of State Legislatures" href="http://en.wikipedia.org/wiki/National_Conference_of_State_Legislatures" class="broken_link" rel="nofollow">National Conference of State Legislatures</a> which maintains a list of enacted and proposed security breach notification laws.</p>
<p>In general, most state laws follow the <a href="http://www.csoonline.com/article/221322/cso-disclosure-series-data-breach-notification-laws-state-by-state" class="broken_link" rel="nofollow">basic tenets of California&#8217;s original law</a>: Companies must immediately disclose a data breach to customers, usually in writing. California has since broadened its law to include compromised medical and health insurance information.</p>
<p>Some important considerations to these laws include, but are not limited to:</p>
<p>1.       The time allotted to inform consumers of a data breach.</p>
<p>2.       Whether or not there are penalties – civil or criminal – for a failure to disclose.</p>
<p>3.       What kinds of breaches, if any, are exempt from reporting.</p>
<p>4.       Whether or not there is <a href="http://www.securityprivacyandthelaw.com/tags/data-breach-notification-act/" class="broken_link" rel="nofollow"><em>a private right of action</em></a> – or the ability for the consumer or employee to pursue a case on their own.</p>
<p>Federal agencies, such as the Federal Trade Commission, are currently reviewing ways to better protect consumer privacy.  Their findings are likely to influence how state legislature votes on some key data breach notification and privacy acts on the floor in 2011. Some of the proposals include requirements for a reasonable effort to be made to avoid a data breach with the use of encryption, designated individuals to lead privacy departments and education throughout the organization, and data security risk assessments prior to a breach.</p>
<p>With the recession driven boom of cybercrime, identity theft and security breaches that is likely to continue to expand in 2011, Congress will probably enact some version of these proposals sooner rather than later. That being said, it is better to <a href="../../../databreach">be prepared</a> and embrace the current and proposed laws before a data breach occurs.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/01/04/helpful-tips-on-data-breach-notification/&via=Experian_DBR&text=Helpful tips on data breach notification&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F01%2F04%2Fhelpful-tips-on-data-breach-notification%2F&amp;title=Helpful%20tips%20on%20data%20breach%20notification" id="wpa2a_4"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/01/04/helpful-tips-on-data-breach-notification/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>