<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; Identity Theft Resource Center</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/tag/identity-theft-resource-center/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>Year of the breach: 2011 in review</title>
		<link>http://www.experian.com/blogs/data-breach/2011/12/20/year-of-the-breach-2011-in-review/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/12/20/year-of-the-breach-2011-in-review/#comments</comments>
		<pubDate>Tue, 20 Dec 2011 23:24:20 +0000</pubDate>
		<dc:creator>kbarney</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Identity Theft Resource Center]]></category>
		<category><![CDATA[PHI]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[privacy legislation]]></category>
		<category><![CDATA[Security Breaches]]></category>
		<category><![CDATA[smishing]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=888</guid>
		<description><![CDATA[Several high profile events throughout the year have kept the spotlight on the issue of data exposures, especially those where millions of consumers information was obtained by malicious hackers.  Although the information involved, emails and passwords, does not rise to the level of a “personal identifying information” (PII) breach, it is definitely troubling that such a large number of consumers may become targets of phishing and related attacks, which do attempt to get consumers PII.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F12%2F20%2Fyear-of-the-breach-2011-in-review%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Data+Breach,Data+Security,Identity+Theft+Resource+Center,PHI,Phishing,PII,privacy+legislation,Security+Breaches,smishing&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/usb_data_breach_laptop_610.jpg"><img class="aligncenter size-full wp-image-891" title="usb_data_breach_laptop_610" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/usb_data_breach_laptop_610.jpg" alt="Business person inserting usb into laptop" width="610" height="407" /></a></p>
<p><em>Our guest blogger this week is Karen Barney of the <a title="Identity Theft Resource Center" href="http://www.idtheftcenter.org/" target="_blank" class="broken_link" rel="nofollow">Identity Theft Resource Center</a> (ITRC).</em></p>
<p>The number of breaches reported so far in 2011 is down from 2010, yet 2011 is still considered by many to be yet another “Year of the Breach”.    Several high profile events throughout the year have kept the spotlight on the issue of data exposures, especially those where millions of <a href="http://www.shutterfly.com/home/myshutterfly.sfly" class="broken_link" rel="nofollow">consumers information</a> was obtained by malicious hackers.  Although the information involved, emails and passwords, does not rise to the level of a “personal identifying information” (PII) breach, it is definitely troubling that such a large number of consumers may become targets of phishing and related attacks, which do attempt to get consumers PII.</p>
<p>More and more entities are now tracking data breach occurrences by:</p>
<ul>
<li>Industry sectors (categories): Business,      educational, government, medical, financial</li>
<li>Breach “type” (method of access): hacking,      insider, portable device (“data on the move”), accidental exposure,      subcontractor, and lost or stolen.       In some cases, discarded paper documents.</li>
<li>various attributes: paper or electronic, encrypted,      password-protected, number of records unknown or published</li>
</ul>
<p>While most definitions and terms are relatively consistent between these monitoring sources, there are some notable differences.  Differing filters applied by each monitoring entity as to what qualifies as a data breach on any given list create some divergence in comparison of breach lists.  These filters may range from whether the incident involves specific types of exposed PII to whether a designated minimum number of records have been compromised (i.e. 10 or 500 minimum).</p>
<p>Often it is how a “record” is defined that yields the greatest disparity in determining the number of “records” exposed.  Many breach analysts consider “records” to those persons whose sensitive <a href="../2011/09/27/ensuring-the-security-of-personal-identifiable-information/">personal identifying information</a> (PII), such as Social Security numbers, debit or credit card numbers, financial account numbers, medical record numbers, and driver’s license or state identification numbers have been exposed.  How then, does one then account for compromised non-PII information, such as email addresses, user names, or other non-financial account information?</p>
<p>Many <a href="../2011/09/06/how-hackers-find-their-targets/">hacking incidents</a> this past year didn’t target personal identifying information, but instead focused on emails addresses, passwords and other pieces of non-sensitive personal information.   The challenge for many who analyze breach incident statistics is how to “quantify” the number of breached records that do not involve PII.  Should emails and passwords be counted as “records” in the same way as Social Security numbers and financial account numbers?   As of now, most state laws do not include non-sensitive personal information as triggers for breach notification therefore there is no obligation to report the incident.</p>
<p>&#8220;The law only requires that an entity notify those who had sensitive information compromised, like Social Security numbers,&#8221; says Lisa Sotto, a managing partner for New York-based law firm Hunton &amp; Williams, in a recent interview with BankInfoSecurity.   &#8220;But now we know other things, like e-mail addresses, can lead to compromise through social engineering and phishing.</p>
<p>The challenge then for the incidence response team is determining if a breach notification is required.  If so, “what happened?”, “who needs to be notified”, “what specifics are required?”, “when do we do it?”, “how did it happen?”, and “what have we done to make sure it won’t happen again?”  The answers to these questions should all be part of an established Breach Response Plan.  Other pieces of this plan should include best practice protocols, procedures, corporate training guidelines and employee education.  In addition, an organizational ethic must be created so that all employees realize the importance of protecting personal information.  A corporate environment must be maintained which fosters and strengthens information security awareness at all levels of the organization.</p>
<p>Another important issue to consider in your company’s <a href="http://www.shutterfly.com/home/myshutterfly.sfly" class="broken_link" rel="nofollow">incident response plan</a> is whether it is in the best interest of the company to report a data breach incident when there is no legal obligation to do so.  Under these circumstances, it is critical that the response team identify the best notification and crisis management tactics before a breach ever occurs.   Those companies with strong incident response plans are able to react more quickly and accurately, prevent further data loss (and potential fines), and present factual reporting to the public that minimizes customer backlash and negative publicity.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/12/20/year-of-the-breach-2011-in-review/&via=Experian_DBR&text=Year of the breach: 2011 in review&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/12/20/year-of-the-breach-2011-in-review/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>What consumers should know about data breach notification</title>
		<link>http://www.experian.com/blogs/data-breach/2011/11/02/what-consumers-should-know-about-data-breach-notification/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/11/02/what-consumers-should-know-about-data-breach-notification/#comments</comments>
		<pubDate>Wed, 02 Nov 2011 16:36:27 +0000</pubDate>
		<dc:creator>kbarney</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Consumer fraud]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Identity Theft Resource Center]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=854</guid>
		<description><![CDATA[It can be unnerving to be told that your information has been compromised in a data breach.  The uncertainty of not knowing all the details and the anxiety over what information has been exposed is deeply troubling to many consumers.  A breach notice makes us aware of a new risk to our lives that we can’t measure easily.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F11%2F02%2Fwhat-consumers-should-know-about-data-breach-notification%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Consumer+fraud,Data+Breach,Data+Breach+Notification,data+breach+response,Fraud,Identity+Theft,Identity+Theft+Resource+Center&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/11/lettermailbox.jpg"><img class="aligncenter size-full wp-image-856" title="lettermailbox" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/11/lettermailbox.jpg" alt="Notification Letter Mailbox" width="448" height="336" /></a></p>
<p><em>Our guest blogger this week is Karen Barney of the <a title="Identity Theft Resource Center" href="http://www.idtheftcenter.org" target="_blank" class="broken_link" rel="nofollow">Identity Theft Resource Center</a> (ITRC).</em></p>
<p>It can be unnerving to be told that your information has been compromised in a data breach.  The uncertainty of not knowing all the details and the anxiety over what information has been exposed is deeply troubling to many consumers.  A breach notice makes us aware of a new risk to our lives that we can’t measure easily.</p>
<p>Often times, there is a lot of speculation surrounding the company’s timing of the <a href="../2011/09/20/over-reporting-vs-under-reporting-data-breaches/">breach notification</a>.  The timing of notification may depend upon a variety of state laws, some of which may delay notification if law enforcement is doing an investigation of the incident and has requested a delay to make the investigation easier.  In most breach cases, the company will want to investigate internally prior to making public notice.  It is important to the consumer and the company that they provide a notice which is accurate.  No one is happy when a notice is made public, and then has to be changed as further information comes to light.  Everyone is better served when the company gets the information right the first time.</p>
<p>It is also important to understand the complexities which may surround various types of data breaches. Not all breaches are equal in the amount of risk posed to the consumer.  For instance, some pieces of information about you are generally available and public, and pose little risk to you taken alone, such as your email address, or first and last name.  Credit card numbers that are exposed are a risk, but not a long term problem, as the issuer will provide a new card with a different account number very quickly.</p>
<p>Additionally, malicious attacks on a company’s server, insider (employee) theft, or the theft of mobile devices (i.e. storage devices, laptops) may be more likely to lead to identity theft than accidental posting on a long-ago cached website or papers left behind in an old abandoned building.  Knowing whether or not the breach incident was malicious or accidental in nature may help you to put the level of risk into a better perspective.</p>
<p>Just remember, unless you know otherwise, the fact that your data was compromised does NOT mean you are an <a href="http://www.protectmyid.com/" class="broken_link" rel="nofollow">identity theft</a> victim.  In fact, there have been millions of people notified that their information may have been breached who have not become identity theft victims. Your <a href="../../../data-breach/data-breach-resources.html">response</a> to the breach will depend on the type of information that was compromised.  Here are some steps you can take at this time:</p>
<p><strong>Financial Account Numbers: </strong></p>
<p>This includes checking accounts, credit cards, money market funds, stocks, and bank accounts:</p>
<ul>
<li>Close      ONLY the affected accounts and have account numbers changed.</li>
<li><a href="../2011/08/23/do-your-passwords-pass-the-hack-test/">Password</a>-protect      <strong>all </strong>your accounts, the new ones      as well as the closed.  This restricts      thieves from re-opening closed accounts.</li>
<li>Monitor      your account and billing statements closely</li>
<li>Report      any fraudulent activity immediately to the bank and law enforcement.</li>
</ul>
<p><strong>Social Security Numbers:<br />
</strong>Call the credit reporting agencies.  These are automated and secure systems.   Place a fraud alert with each agency and request a free copy of each of your credit reports.  It is free because your information was breached and you are a potential victim of identity theft.  Do this for any person whose Social Security Number (SSN) was compromised. If the SSN belongs to a child, you should find that there is <strong>no credit report </strong>available for that <a href="http://www.familysecure.com/default.aspx?sc=668285" class="broken_link" rel="nofollow">child</a>.  If there is a credit report for a child, it indicates that the child’s information may have been used. In that case, you need to get a copy of the credit report in order to repair the incorrect items.</p>
<p>It is also recommended that you call all three credit reporting agencies and not just one.  Check your report carefully for any irregularities.  Sometimes people see errors on the report that were on the report before the data breach occurred.</p>
<p>You can use, without charge, the annual credit reports system <a href="http://www.annualcreditreport.com/" class="broken_link" rel="nofollow">www.annualcreditreport.com</a> to monitor your credit report over the next year. Stagger them throughout the year by ordering one every four months.</p>
<p>Or, if you want real-time updates on your credit report, you may want to consider a paid service which monitors your credit report and alerts you immediately upon any change.</p>
<p><strong> </strong></p>
<p><strong>Other:</strong></p>
<ul>
<li>If your auto or medical insurance policy information is      involved, ask the company about their policy to protect compromised      policies.</li>
<li>If it is HR data that was compromised, change account numbers      for your 401-K, life insurance, and accounts holding your stock options.  Password-protect these accounts.</li>
<li>Driver’s License’s &#8211; contact your state Department/Bureau of      Motor Vehicles and notify them of the theft.  They most likely will not change your      number.</li>
</ul>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/11/02/what-consumers-should-know-about-data-breach-notification/&via=Experian_DBR&text=What consumers should know about data breach notification&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/11/02/what-consumers-should-know-about-data-breach-notification/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Ensuring the security of personal identifiable information</title>
		<link>http://www.experian.com/blogs/data-breach/2011/09/27/ensuring-the-security-of-personal-identifiable-information/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/09/27/ensuring-the-security-of-personal-identifiable-information/#comments</comments>
		<pubDate>Tue, 27 Sep 2011 17:33:12 +0000</pubDate>
		<dc:creator>kbarney</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Identity Theft Resource Center]]></category>
		<category><![CDATA[PII]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=794</guid>
		<description><![CDATA[Everywhere you turn these days there’s word of a new data breach.  In the course of our lifetime, our “personal identifying information (PII)” is shared with hundreds of companies, governmental agencies, educational facilities, businesses and health care providers.  What can a consumer do to protect their sensitive personal information?]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F09%2F27%2Fensuring-the-security-of-personal-identifiable-information%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach,Identity+Theft+Resource+Center,PII&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/09/security2.jpg"><img class="aligncenter size-full wp-image-796" title="C" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/09/security2.jpg" alt="" width="448" height="336" /></a></p>
<p>Everywhere you turn these days there’s word of a new data breach.  Your old college – archives hacked.  Your dentist’s office – files stolen.  The local retailer – credit cards skimmed.  Government offices – accidental posting of information online.</p>
<p>In the course of our lifetime, our “personal identifying information (PII)” is shared with hundreds of companies, governmental agencies, educational facilities, businesses and healthcare providers.  Social Security Numbers, account numbers, birthdates, and other identifiers are diffused into thousands of databases, each with its own risk of exposing our PII.</p>
<p>These are all areas that the ITRC recognizes as areas “beyond your personal control”.  While you make every effort to protect your personal identifying information, the same cannot always be said for those who hold it in their possession.</p>
<p>Data breaches (the inadvertent or malicious exposure of our sensitive personal information) are a fact of modern life as evidenced by the many high profile data security breaches which have occurred throughout 2011.  Late in 2010 the ITRC predicted an increase in breaches aimed at email lists which would lead to more social networking scams and malware attacks.  This has indeed come to pass.</p>
<p>The harsh reality is that our personal information is simply available in too many places to ensure a high level of security over a long period of time.  So what can a consumer do to minimize their risk in these areas which are beyond our control?  Before you provide your personal information, ask the following questions:</p>
<ul>
<li>Why do you need my Social Security number? </li>
<li>What will happen if I don’t provide it?</li>
<li>Is there an alternative identifier you can use instead? </li>
<li>How is it going to be used?</li>
<li>Do you have published policies about data protection?</li>
</ul>
<p>Depending on the answers, you may have a decision to make.  You can decide to continue with that company, or find one that will provide acceptable answers.  It’s your data they will control.</p>
<p>Businesses have both an ethical and legal responsibility to <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">protect</a> personal identifying information and control access to such information.  Businesses should clearly identify their specific need to collect sensitive personal information and to ensure that those within a company, who access this information, have a recognized need for such access</p>
<p>Additionally, consumers need to make the case with businesses that data protection is a critical issue.  This point can be made by alerting businesses that access to an individual’s SSN should never be taken lightly.</p>
<p><a title="Experian's Turn-Key Data Breach Resolution" href="http://www.experian.com/data-breach/data-breach-security.html?WT.srch=ecd_dbres_blog_092711_article  "><div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff">Learn more about Experian&#8217;s Turn-Key Data Breach Resolution Support!</div></div></a></p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/09/27/ensuring-the-security-of-personal-identifiable-information/&via=Experian_DBR&text=Ensuring the security of personal identifiable information&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/09/27/ensuring-the-security-of-personal-identifiable-information/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Child identity theft: A new frontier for fraudsters</title>
		<link>http://www.experian.com/blogs/data-breach/2011/08/09/child-identity-theft-a-new-frontier-for-fraudsters/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/08/09/child-identity-theft-a-new-frontier-for-fraudsters/#comments</comments>
		<pubDate>Tue, 09 Aug 2011 19:01:15 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Child Identity Theft]]></category>
		<category><![CDATA[Credit report monitoring]]></category>
		<category><![CDATA[Federal Trade Commission]]></category>
		<category><![CDATA[Identity Theft Resource Center]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=710</guid>
		<description><![CDATA[A recent Federal Trade Commission discussion, "Stolen Futures: A Forum on Child Identity Theft,” presented a valuable opportunity to galvanize industry experts and public leaders around this increasing privacy threat.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F08%2F09%2Fchild-identity-theft-a-new-frontier-for-fraudsters%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Child+Identity+Theft,Credit+report+monitoring,Federal+Trade+Commission,Identity+Theft+Resource+Center&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/08/kids2-300x200.jpg"></a><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/08/Children%20Safe.jpg" class="broken_link" rel="nofollow"></a> <a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/08/Child-Identity-Theft.jpg"><img class="aligncenter size-full wp-image-718" title="happy kids" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/08/Child-Identity-Theft.jpg" alt="" width="423" height="283" /></a></p>
<p>You might think you’re pretty savvy when it comes to understanding identity theft.  But what about when identity theft threatens your children?</p>
<p>A recent Federal Trade Commission discussion, &#8220;Stolen Futures: A Forum on Child Identity Theft,” presented a valuable opportunity to galvanize industry experts and public leaders around this increasing privacy threat.  Pop quiz: <a rel="”nofollow” nofollow" href="http://www.familysecure.com/PDFs/FamilySecure.com-InfoBrochure-HighRes_Final.pdf" target="_blank" class="broken_link">did you know</a>….</p>
<ul>
<li>Children are 51 times more likely to become victims of identity theft than adults, with anywhere from 140,000 to 400,000 children affected annually by this crime.</li>
<li>Criminals can easily establish fraudulent credit files in a child’s name and use them for years without detection.</li>
<li>Child identity thefts often aren’t discovered until the youngster applies for a driver’s license, summer job or college loans.</li>
<li>Thieves snatch children’s Social Security numbers and other personal information from day care centers, hospitals, schools, and even sports team applications.</li>
<li>Stolen identities can result in credit damage for years, resulting in denial of college loans, inability to rent an apartment, difficulty in getting hired for a job, confusion around medical records, and driving records attached to a criminal’s name.</li>
</ul>
<p>Children make vulnerable prey for identity thieves, with fresh, unused Social Security numbers that can easily be applied to another person’s birth date and name.  The sad truth is that these crimes are often perpetrated by the victim’s own family, making it difficult for the child (when he’s an adult) or non-offending family members to report the incident.  Foster children are particularly vulnerable since their personal information is passed around from family to family.</p>
<p>Whether the theft was committed by strangers or family, identity theft causes financial as well as emotional suffering for children, especially once they become old enough to fully understand how they were victimized.  The <a rel="”nofollow” nofollow" href="http://www.idtheftcenter.org/artman2/publish/v_fact_sheets/Fact_Sheet_120.shtml" target="_blank" class="broken_link">Identity Theft Resource Center</a> offers helpful fact sheets that explain the process of reporting and repairing credit damage as well as healing the emotional wounds from these crimes.</p>
<p>What can you do to <a rel="”nofollow” nofollow" href="http://articles.baltimoresun.com/2011-05-29/business/bs-bz-ambrose-child-identity-theft-20110529_1_identity-theft-resource-center-social-security-number-privacy-and-identity-protection" target="_blank" class="broken_link">protect your child</a>?</p>
<ul>
<li>Fiercely guard your child’s social security number, only giving it out when absolutely necessary and after you’ve been assured it will be well protected.</li>
<li>Teach your child to protect himself online by keeping his personal information private.</li>
<li>Investigate red flags like debt collectors calling for your child or mail addressed to your child from debt consolidators.</li>
<li>Enroll your child in <a href="http://www.protectmyid.com/" target="_blank" class="broken_link" rel="nofollow">credit report monitoring</a> that will immediately alert you to suspicious activity.</li>
</ul>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/08/09/child-identity-theft-a-new-frontier-for-fraudsters/&via=Experian_DBR&text=Child identity theft: A new frontier for fraudsters&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/08/09/child-identity-theft-a-new-frontier-for-fraudsters/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>10 ways that breaches burn business</title>
		<link>http://www.experian.com/blogs/data-breach/2011/02/15/10-ways-that-breaches-burn-business/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/02/15/10-ways-that-breaches-burn-business/#comments</comments>
		<pubDate>Tue, 15 Feb 2011 17:30:21 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[credit monitoring]]></category>
		<category><![CDATA[Forrester Research]]></category>
		<category><![CDATA[Identity Theft Resource Center]]></category>
		<category><![CDATA[Internet Retailer]]></category>
		<category><![CDATA[Security Breaches]]></category>
		<category><![CDATA[U.S. Bureau of Justice Statistics]]></category>
		<category><![CDATA[Unisys]]></category>
		<category><![CDATA[Zogby]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=297</guid>
		<description><![CDATA[Don’t let your bottom line go up in flames: understand how security breaches impact your business and take aggressive action to avert disaster.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F02%2F15%2F10-ways-that-breaches-burn-business%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=credit+monitoring,Forrester+Research,Identity+Theft,Identity+Theft+Resource+Center,Internet+Retailer,Security+Breaches,U.S.+Bureau+of+Justice+Statistics,Unisys,Zogby&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/02/mp_burning_money.jpg"><img class="aligncenter size-full wp-image-299" title="mp_burning_money" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/02/mp_burning_money.jpg" alt="" width="420" height="240" /></a></p>
<p>With a little bad luck, security breaches can become the match that sets your revenues aflame.  Breaches are big business for fraud “arsonists” who smoke out ways to profit from your pain.  How big?  Here’s what the <span style="text-decoration: underline;"><a rel="nofollow" href="http://www.idtheftcenter.org/workplace_facts.html" target="_blank" class="broken_link">Identity Theft Resource Center</a></span> has uncovered about security breaches and the workplace:</p>
<p>1.     According to one study, identity theft cost U.S. businesses and consumers $56.6 billion in a given year.</p>
<p>2.     One expert calculated that the loss or theft of just one laptop can cost a company as much as $90,000 or more in fines, <span style="text-decoration: underline;"><a href="../../../data-breach/credit-monitoring-service.html" target="_blank">credit monitoring</a></span> for victims, public relations damage control, and class action litigation.</p>
<p>3.     According to the <span style="text-decoration: underline;"><a rel="nofollow" href="http://bjs.ojp.usdoj.gov/" target="_blank" class="broken_link">U.S. Bureau of Justice Statistics</a></span>, identity theft is now surpassing drug trafficking as the number one crime in the nation.  Further, a preliminary study done by ITRC shows that the majority of identity theft criminals are repeat offenders.</p>
<p>4.     One survey showed that 21 of the top 100 U.S. retail financial institutions reported that 39% of respondents indicated an increase in online banking and bill-payment losses over the past year.</p>
<p>5.     A Zogby study reports that 91% of Americans are now concerned about identity theft and expressed concern that legitimate retailers would sell their information without consent. 83% are specifically worried that information will wind up in the hands of a third party.</p>
<p>6.     In that same study, 34% of respondents did not believe retailers are doing a good job of protecting their personal data, compared to 28% who felt companies protect data adequately.</p>
<p>7.     A <span style="text-decoration: underline;">Unisys</span> survey reported by <span style="text-decoration: underline;"><a rel="nofollow" href="http://www.internetretailer.com/2007/04/12/fraud-fears-prevent-half-of-consumers-from-shopping-online-with" target="_blank" class="broken_link">Internet Retailer</a></span> said that 16% of respondents have stopped shopping online because the process requires a bank card, citing fear of card fraud and theft.</p>
<p>8.     The same study reported that 69% of those survey said they would stop using a site that lost their personal information.</p>
<p>9.     According to a <a rel="nofollow" href="http://www.informationweek.com/news/security/showArticle.jhtml?articleID=199000222" target="_blank" class="broken_link"><span style="text-decoration: underline;">Forrester Research study</span></a> entitled “Calculating the Cost of a Security Breach,” the costs of a data breach vary widely, ranging $90 to $305 per customer record, depending on whether the breach is “low-profile” or “high-profile” and the company is in a non-regulated or highly regulated area, such as banking.</p>
<p>10.  The same study did the math and estimated the cost of a <span style="text-decoration: underline;"><a href="../../../data-breach/data-breach-resources.html" target="_blank">breach</a></span> at $50 per customer record for the discovery, notification and response that brings in unexpected expenses associated with legal counsel, call centers and mail notification.  It also noted that lost employee productivity would range from $20 to $30 per customer record.</p>
<p>Don’t let your bottom line go up in flames: understand how security breaches impact your business and take aggressive action to avert disaster.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/02/15/10-ways-that-breaches-burn-business/&via=Experian_DBR&text=10 ways that breaches burn business&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/02/15/10-ways-that-breaches-burn-business/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Ensuring compliance with new healthcare legislation</title>
		<link>http://www.experian.com/blogs/data-breach/2010/11/23/ensuring-compliance-with-new-healthcare-legislation/</link>
		<comments>http://www.experian.com/blogs/data-breach/2010/11/23/ensuring-compliance-with-new-healthcare-legislation/#comments</comments>
		<pubDate>Tue, 23 Nov 2010 16:45:47 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Fraud Resolution]]></category>
		<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[HITECH]]></category>
		<category><![CDATA[Identity Theft Resource Center]]></category>
		<category><![CDATA[Medical Data Breach]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=216</guid>
		<description><![CDATA[Legislation has been introduced in Congress to crack down on Medicare and Medicaid fraud. This legislation comes at a time when incidents of medical fraud are on the rise and the Obama Administration is poised to role out sweeping healthcare reform.  Medical fraud is estimated to cost the U.S. health care system $100 billion a [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2010%2F11%2F23%2Fensuring-compliance-with-new-healthcare-legislation%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Fraud,healthcare,HIPAA,HITECH,Identity+Theft+Resource+Center,Medical+Data+Breach&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>Legislation has been introduced in Congress to crack down on Medicare and Medicaid fraud. This <span style="text-decoration: underline;"><a href="http://www.ofr.gov/inspection.aspx" target="_blank" class="broken_link" rel="nofollow">legislation</a></span> comes at a time when incidents of medical fraud are on the rise and the Obama Administration is poised to role out sweeping healthcare reform.  <span style="text-decoration: underline;"><a href="http://money.cnn.com/2010/01/13/news/economy/health_care_fraud/" target="_blank" class="broken_link" rel="nofollow">Medical fraud</a></span> is estimated to cost the U.S. health care system $100 billion a year.</p>
<p>The <span style="text-decoration: underline;"><a href="http://www.usatoday.com/news/washington/2010-09-20-medicare-new-rules_N.htm?loc=interstitialskip" target="_blank" class="broken_link" rel="nofollow">new rules</a></span> will give federal health officials key powers to detect fraud early and prevent improper payments from being made.  For example, medical provider employees will be subject to fingerprinting, payments will be suspended to health organizations that are under investigation and medical programs will be required to stop using providers kicked out of Medicare or Medicaid programs.</p>
<p>These rules have serious implications for the health care industry that must also comply with stringent new HITECH rules. As I mentioned in a <span style="text-decoration: underline;"><a href="../2010/09/07/do-your-business-associates-know-how-they-will-be-affected-by-hitech/" target="_blank">previous blog</a></span> entry, some professionals feel the best way to comply with the new requirements is to be proactive.  For example, providers should consider actively working with their vendors to ensure all parties comply with the new standards.</p>
<p>Another recommendation is to conduct an internal risk assessment. A thorough assessment can identify where a business is not complying with the HITECH Act or HIPAA standards and provide an opportunity to make the right adjustments. Non-compliance can result in up to $1.5 million in fines or even civil action from a State Attorney General.</p>
<p>Learn more about <a href="http://www.experian.com/data-breach/data-breach-information.html" target="_blank"><span style="text-decoration: underline;">risk assessments</span> </a>and act now before it’s too late.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2010/11/23/ensuring-compliance-with-new-healthcare-legislation/&via=Experian_DBR&text=Ensuring compliance with new healthcare legislation&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2010%2F11%2F23%2Fensuring-compliance-with-new-healthcare-legislation%2F&amp;title=Ensuring%20compliance%20with%20new%20healthcare%20legislation" id="wpa2a_2"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2010/11/23/ensuring-compliance-with-new-healthcare-legislation/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Child ID theft has serious business implications</title>
		<link>http://www.experian.com/blogs/data-breach/2010/09/16/child-id-theft-has-serious-business-implications/</link>
		<comments>http://www.experian.com/blogs/data-breach/2010/09/16/child-id-theft-has-serious-business-implications/#comments</comments>
		<pubDate>Thu, 16 Sep 2010 18:58:53 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[child identity monitoring]]></category>
		<category><![CDATA[Child Identity Theft]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[Identity Theft Resource Center]]></category>
		<category><![CDATA[PII]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=131</guid>
		<description><![CDATA[Identity thieves are becoming more skilled as they focus on stealing dormant social security numbers that belong to children.  Experts point out that frequently the parents and children are not aware of the fraud and potential financial damage until the minor applies for his or her first job or student loan.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2010%2F09%2F16%2Fchild-id-theft-has-serious-business-implications%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=child+identity+monitoring,Child+Identity+Theft,Cyber+Security,Identity+Theft+Prevention,Identity+Theft+Resource+Center,PII&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>Identity thieves are becoming more skilled as they focus on stealing dormant social security numbers that belong to children. According to the <span style="text-decoration: underline;"><a href="http://www.idtheftcenter.org/artman2/publish/m_press/Childs_SSN.shtml" target="_blank" class="broken_link" rel="nofollow">Identity Theft Resource Center</a></span> (ITRC) credit issuers do not have the ability to verify a SSN as belonging to an adult or minor which makes <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">detecting fraud</a> against minors more difficult. <span style="text-decoration: underline;"><a href="http://www.boston.com/community/moms/blogs/moms_are_talking_about/2010/07/i_like_to_think_my.html" target="_blank" class="broken_link" rel="nofollow">Experts</a></span> point out that frequently the parents and children are not aware of the fraud and potential financial damage until the minor applies for his or her first job or student loan.  As you can imagine, significant damage to the minor’s credit may have already occurred.</p>
<p>This nascent threat has serious implications for business, lenders, and educational institutions that make decisions based on credit reports and scores.  For example, a <span style="text-decoration: underline;"><a href="http://news.yahoo.com/s/ap/20100802/ap_on_bi_ge/us_credit_fraud_children" target="_blank" class="broken_link" rel="nofollow">recent scam</a></span> was uncovered where thieves sold dormant SSNs to people looking to rebuild their credit rating. People who buy these numbers build their credit score by linking to a dormant credit file, a process called “piggybacking.” Unfortunately, these dormant files most likely belong to minors.</p>
<p>The economic downturn and mortgage crises have resulted in tightened lending policies and a greater focus on credit profiles. Many lending decisions are made simply on a defined credit score threshold. However, with the increase in incidents of “piggybacking” on dormant accounts, a growing number of these scores will be based on fraudulent information.</p>
<p>The ITRC has <span style="text-decoration: underline;"><a href="http://www.idtheftcenter.org/artman2/publish/m_press/Childs_SSN.shtml" target="_blank" class="broken_link" rel="nofollow">proposed</a></span> creating a database that enables businesses to verify if a submitted SSN is that of a minor creating an opportunity to identify fraud.  Visit the ITRC to learn more.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2010/09/16/child-id-theft-has-serious-business-implications/&via=Experian_DBR&text=Child ID theft has serious business implications&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2010/09/16/child-id-theft-has-serious-business-implications/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Do your business associates know how they will be affected by HITECH?</title>
		<link>http://www.experian.com/blogs/data-breach/2010/09/07/do-your-business-associates-know-how-they-will-be-affected-by-hitech/</link>
		<comments>http://www.experian.com/blogs/data-breach/2010/09/07/do-your-business-associates-know-how-they-will-be-affected-by-hitech/#comments</comments>
		<pubDate>Tue, 07 Sep 2010 23:30:30 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[HITECH Act]]></category>
		<category><![CDATA[Identity Theft Resource Center]]></category>
		<category><![CDATA[Medical Data Breach]]></category>
		<category><![CDATA[PHI]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=37</guid>
		<description><![CDATA[Just as the healthcare industry came up to speed on the regulations defined  in The Health Information Technology for Economic and Clinical Health ("HITECH") Act, additional modifications are being proposed. These proposed rules focus on expanding obligations and penalties for covered entities (CEs) to now include business associates (BAs). So why is this significant? ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2010%2F09%2F07%2Fdo-your-business-associates-know-how-they-will-be-affected-by-hitech%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Fraud,healthcare,HIPAA,HITECH+Act,Identity+Theft+Resource+Center,Medical+Data+Breach,PHI&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><img class="size-full wp-image-129 alignnone" title="medical doctor" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2010/09/medical-doctor.jpg" alt="" width="521" height="260" /></p>
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">
<p>Just as the <a href="http://www.experian.com/data-breach/healthcare-data-breach.html" target="_blank">healthcare industry</a> came up to speed on the <a href="http://www.hipaasurvivalguide.com" target="_blank" class="broken_link" rel="nofollow"><span style="text-decoration: underline;">regulations defined</span></a> in The Health Information Technology for Economic and Clinical Health (&#8220;HITECH&#8221;) Act, additional modifications are being proposed. These <span style="text-decoration: underline;"><a href="http://www.hhs.gov/ocr/privacy/hipaa/understanding/coveredentities/breachnotificationifr.html" target="_blank" class="broken_link" rel="nofollow">proposed rules</a></span> focus on expanding obligations and penalties for covered entities (CEs) to now include business associates (BAs).</p>
<p>So why is this significant? For two reasons. First, combined with the HITECH Act, the new rules will expand both the application of certain HIPAA Security and Privacy requirements and penalties to business associates.  Secondly, the proposal expands the definition of BA to include subcontractors who handle health information. Subcontractors would be considered BAs and are subject to direct liability under the HIPAA rules.</p>
<p>Many provider networks, physician practices and insurance plans work with outside vendors to manage their businesses and patient health information.  Many of these providers are BAs who use sub-contractors.  Under the proposed new regulations, these subcontractors must also be HIPAA compliant and follow the HITECH regulations or face penalties. This also means that CEs could be held liable when a BA does not comply.</p>
<p>How well does your company know its business associates…<em>and the businesses that they do business with</em>? As health care organizations expand their operations, it is imperative that due diligence is performed to avoid potential liability stemming from non-compliant vendors.  <a href="http://www.abanet.org/health/esource/Volume5/10/Nosowsky.html" target="_blank" class="broken_link" rel="nofollow"><span style="text-decoration: underline;">Some privacy professionals</span> </a>feel the best way to prevent liability under the new requirements is to be proactive about adhering to compliance standards.</p>
<p>Companies should consider actively working with their <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">vendors </a>to address the stringent HITECH requirements and ensure that anyone that falls under the BA category is aware of the full implications as it relates to HITECH and HIPAA.  The more proactive you are the better chance you have of avoiding potentially heavy fines due to the ignorance of a BA that was not aware of the law.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2010/09/07/do-your-business-associates-know-how-they-will-be-affected-by-hitech/&via=Experian_DBR&text=Do your business associates know how they will be affected by HITECH?&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2010/09/07/do-your-business-associates-know-how-they-will-be-affected-by-hitech/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Warning: Medical data breaches are on the rise</title>
		<link>http://www.experian.com/blogs/data-breach/2010/09/07/warning-medical-data-breaches-are-on-the-rise/</link>
		<comments>http://www.experian.com/blogs/data-breach/2010/09/07/warning-medical-data-breaches-are-on-the-rise/#comments</comments>
		<pubDate>Tue, 07 Sep 2010 23:22:15 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Data Policy]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[Identity Theft Resource Center]]></category>
		<category><![CDATA[Medical Data Breach]]></category>
		<category><![CDATA[PHI]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=36</guid>
		<description><![CDATA[According to a recent study by the Identity Theft Resource Center, data breaches in the healthcare sector are occurring at a higher rate than in other industries.  The study found that of the 385 data breaches that occurred in the U.S. in the first half of 2010, 30% of those affected were healthcare providers.  In comparison, data breaches reported in banking and other financial institutions for the same time period totaled 10%.

What is the cause of this large discrepancy between industries?]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2010%2F09%2F07%2Fwarning-medical-data-breaches-are-on-the-rise%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Policy,Fraud,healthcare,Identity+Theft+Resource+Center,Medical+Data+Breach,PHI&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2010/09/Medical-Files-2010-09-07-at-10.40.38-PM.png"><img class="size-full wp-image-58 alignnone" title="Medical Files 2010-09-07 at 10.40.38 PM" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2010/09/Medical-Files-2010-09-07-at-10.40.38-PM.png" alt="" width="487" height="325" /></a></p>
<p>According to a recent study by the <a href="http://www.idtheftcenter.org/index.html" target="_blank" class="broken_link" rel="nofollow"><span style="text-decoration: underline;">Identity Theft Resource Center</span></a>, <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">data breaches</a> in the healthcare sector are occurring at a higher rate than in other industries.  The study found that of the 385 data breaches that occurred in the U.S. in the first half of 2010, 30% of those affected were healthcare providers.  In comparison, data breaches reported in banking and other financial institutions for the same time period totaled 10%.</p>
<p>What is the cause of this large discrepancy between industries?  According to commentary provided by<a href="http://www.esecurityplanet.com/trends/article.php/3896676/Data-Breaches-Continue-to-Plague-Health-Care-Orgs.htm" target="_blank" class="broken_link" rel="nofollow"> <span style="text-decoration: underline;">eSecurity Planet</span></a>, the increase may be due to the many different types of workers that have access to areas in healthcare organizations buildings where sensitive data is stored. This unrestricted access provides an opportunity for unauthorized employees to access laptops, USB drives or desktops with sensitive information from areas that are far less secure than at a bank or other financial institutions.</p>
<p>This sharp increase has caught the attention of the US Congress that is set to approve $1.7 billion to <span style="text-decoration: underline;"><a href="http://www.bloomberg.com/news/2010-08-06/government-fraud-strike-forces-to-expand-under-obama-spending-plans.html" target="_blank" class="broken_link" rel="nofollow">fight healthcare fraud</a></span>. A large portion of that spend will go towards creating fraud “task forces” in up to 20 cities across the U.S. Watchdog groups and patient privacy advocates are also putting pressure on healthcare organizations to protect patient’s medical records and personal information especially as patient records become digital and are stored by third parties.</p>
<p>Deterring and detecting data breach threats does not happen by chance.  Now more than ever, it is important for healthcare companies to take advantage of proven data security solutions and to develop policies, like those used in other industries, to help protect patient data.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2010/09/07/warning-medical-data-breaches-are-on-the-rise/&via=Experian_DBR&text=Warning: Medical data breaches are on the rise&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2010/09/07/warning-medical-data-breaches-are-on-the-rise/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>