<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; privacy legislation</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/tag/privacy-legislation/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>Consequences following a data breach</title>
		<link>http://www.experian.com/blogs/data-breach/2012/01/25/consequences-following-a-data-breach/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/01/25/consequences-following-a-data-breach/#comments</comments>
		<pubDate>Wed, 25 Jan 2012 16:58:48 +0000</pubDate>
		<dc:creator>lponemon</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Fraud Resolution]]></category>
		<category><![CDATA[breach notification fatigue]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[healthcare data breach]]></category>
		<category><![CDATA[Ponemon Institute]]></category>
		<category><![CDATA[privacy legislation]]></category>
		<category><![CDATA[ProtectMyID]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=923</guid>
		<description><![CDATA[Our latest study, Aftermath of a Data Breach Study, was conducted to better understand how a data breach affects organizations over the long term.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F01%2F25%2Fconsequences-following-a-data-breach%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+notification+fatigue,Data+Breach+Notification,data+breach+response,healthcare+data+breach,Ponemon+Institute,privacy+legislation,ProtectMyID&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/01/security-1024x722.jpg"><img class="aligncenter size-full wp-image-938" title="security-1024x722" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/01/security-1024x722.jpg" alt="" width="553" height="390" /></a></p>
<p><em>Our guest blogger this week is Dr. Larry Ponemon, Chairman and Founder of the <a title="Ponemon Institute Website" href="http://www.ponemon.org/index.php" target="_blank" class="broken_link" rel="nofollow">Ponemon Institute</a>.</em></p>
<p>Our latest study, <a title="Ponemon Aftermath Study Landing Page" href="http://www.experian.com/PonemonAftermathStudy" target="_blank">Aftermath of a Data Breach Study</a>, was conducted to better understand how a data breach affects organizations over the long term. In this study, IT professionals weigh in on how their organizations dealt with a data breach that had both serious financial and reputational consequences. While we asked respondents to focus on just one breach, 85 percent say that their organizations had more than one breach involving customer/consumer data in the past 24 months. It is interesting to note that in many cases it took a serious data breach to make privacy and data protection a greater priority and allocate additional resources to the IT security function.</p>
<p>While many respondents were unable to determine the root cause of the data breach, there is a consensus among respondents that insider negligence is making their organizations vulnerable to a data breach. As a result, organizations are investing in training and awareness and technologies that minimize the human factor risk.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"> <a title="Ponemone Reputation of Data Breach Study" href="http://www.experian.com/innovation/business-resources/reputation-impact-data-breach.jsp?WT.srch=ecd_dbres_blog_012512_article ">Download the Ponemon Reputation Impact Study</a> to learn what executives are saying about how a data breach can affect the reputation and image of an organization.</div></div>
<p>The findings also show the concern organizations have about <a title="How data breaches harm reputations" href="http://www.experian.com/blogs/data-breach/2012/01/17/how-data-breaches-harm-reputations/" target="_blank">losing the loyalty</a> of their customers. Of the IT practitioners surveyed, few felt that prompt notification to victims was enough to reduce the negative consequences of the data breach. This suggests that compliance with data breach notifications laws in and of itself is not sufficient if an organization is concerned about customer loyalty and reputation. Other lessons learned from the data breach are to limit the amount of personal data collected, limit sharing with third parties and limit the amount of personal data stored. We invite you to read the <a title="Ponemon Aftermath Study Landing Page" href="http://www.experian.com/PonemonAftermathStudy" target="_blank">full report here</a>.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/01/25/consequences-following-a-data-breach/&via=Experian_DBR&text=Consequences following a data breach&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/01/25/consequences-following-a-data-breach/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Year of the breach: 2011 in review</title>
		<link>http://www.experian.com/blogs/data-breach/2011/12/20/year-of-the-breach-2011-in-review/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/12/20/year-of-the-breach-2011-in-review/#comments</comments>
		<pubDate>Tue, 20 Dec 2011 23:24:20 +0000</pubDate>
		<dc:creator>kbarney</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Identity Theft Resource Center]]></category>
		<category><![CDATA[PHI]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[privacy legislation]]></category>
		<category><![CDATA[Security Breaches]]></category>
		<category><![CDATA[smishing]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=888</guid>
		<description><![CDATA[Several high profile events throughout the year have kept the spotlight on the issue of data exposures, especially those where millions of consumers information was obtained by malicious hackers.  Although the information involved, emails and passwords, does not rise to the level of a “personal identifying information” (PII) breach, it is definitely troubling that such a large number of consumers may become targets of phishing and related attacks, which do attempt to get consumers PII.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F12%2F20%2Fyear-of-the-breach-2011-in-review%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Data+Breach,Data+Security,Identity+Theft+Resource+Center,PHI,Phishing,PII,privacy+legislation,Security+Breaches,smishing&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/usb_data_breach_laptop_610.jpg"><img class="aligncenter size-full wp-image-891" title="usb_data_breach_laptop_610" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/usb_data_breach_laptop_610.jpg" alt="Business person inserting usb into laptop" width="610" height="407" /></a></p>
<p><em>Our guest blogger this week is Karen Barney of the <a title="Identity Theft Resource Center" href="http://www.idtheftcenter.org/" target="_blank" class="broken_link" rel="nofollow">Identity Theft Resource Center</a> (ITRC).</em></p>
<p>The number of breaches reported so far in 2011 is down from 2010, yet 2011 is still considered by many to be yet another “Year of the Breach”.    Several high profile events throughout the year have kept the spotlight on the issue of data exposures, especially those where millions of <a href="http://www.shutterfly.com/home/myshutterfly.sfly" class="broken_link" rel="nofollow">consumers information</a> was obtained by malicious hackers.  Although the information involved, emails and passwords, does not rise to the level of a “personal identifying information” (PII) breach, it is definitely troubling that such a large number of consumers may become targets of phishing and related attacks, which do attempt to get consumers PII.</p>
<p>More and more entities are now tracking data breach occurrences by:</p>
<ul>
<li>Industry sectors (categories): Business,      educational, government, medical, financial</li>
<li>Breach “type” (method of access): hacking,      insider, portable device (“data on the move”), accidental exposure,      subcontractor, and lost or stolen.       In some cases, discarded paper documents.</li>
<li>various attributes: paper or electronic, encrypted,      password-protected, number of records unknown or published</li>
</ul>
<p>While most definitions and terms are relatively consistent between these monitoring sources, there are some notable differences.  Differing filters applied by each monitoring entity as to what qualifies as a data breach on any given list create some divergence in comparison of breach lists.  These filters may range from whether the incident involves specific types of exposed PII to whether a designated minimum number of records have been compromised (i.e. 10 or 500 minimum).</p>
<p>Often it is how a “record” is defined that yields the greatest disparity in determining the number of “records” exposed.  Many breach analysts consider “records” to those persons whose sensitive <a href="../2011/09/27/ensuring-the-security-of-personal-identifiable-information/">personal identifying information</a> (PII), such as Social Security numbers, debit or credit card numbers, financial account numbers, medical record numbers, and driver’s license or state identification numbers have been exposed.  How then, does one then account for compromised non-PII information, such as email addresses, user names, or other non-financial account information?</p>
<p>Many <a href="../2011/09/06/how-hackers-find-their-targets/">hacking incidents</a> this past year didn’t target personal identifying information, but instead focused on emails addresses, passwords and other pieces of non-sensitive personal information.   The challenge for many who analyze breach incident statistics is how to “quantify” the number of breached records that do not involve PII.  Should emails and passwords be counted as “records” in the same way as Social Security numbers and financial account numbers?   As of now, most state laws do not include non-sensitive personal information as triggers for breach notification therefore there is no obligation to report the incident.</p>
<p>&#8220;The law only requires that an entity notify those who had sensitive information compromised, like Social Security numbers,&#8221; says Lisa Sotto, a managing partner for New York-based law firm Hunton &amp; Williams, in a recent interview with BankInfoSecurity.   &#8220;But now we know other things, like e-mail addresses, can lead to compromise through social engineering and phishing.</p>
<p>The challenge then for the incidence response team is determining if a breach notification is required.  If so, “what happened?”, “who needs to be notified”, “what specifics are required?”, “when do we do it?”, “how did it happen?”, and “what have we done to make sure it won’t happen again?”  The answers to these questions should all be part of an established Breach Response Plan.  Other pieces of this plan should include best practice protocols, procedures, corporate training guidelines and employee education.  In addition, an organizational ethic must be created so that all employees realize the importance of protecting personal information.  A corporate environment must be maintained which fosters and strengthens information security awareness at all levels of the organization.</p>
<p>Another important issue to consider in your company’s <a href="http://www.shutterfly.com/home/myshutterfly.sfly" class="broken_link" rel="nofollow">incident response plan</a> is whether it is in the best interest of the company to report a data breach incident when there is no legal obligation to do so.  Under these circumstances, it is critical that the response team identify the best notification and crisis management tactics before a breach ever occurs.   Those companies with strong incident response plans are able to react more quickly and accurately, prevent further data loss (and potential fines), and present factual reporting to the public that minimizes customer backlash and negative publicity.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/12/20/year-of-the-breach-2011-in-review/&via=Experian_DBR&text=Year of the breach: 2011 in review&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/12/20/year-of-the-breach-2011-in-review/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Security vs. Commerce: Striking a balance</title>
		<link>http://www.experian.com/blogs/data-breach/2011/08/02/security-vs-commerce-striking-a-balance/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/08/02/security-vs-commerce-striking-a-balance/#comments</comments>
		<pubDate>Tue, 02 Aug 2011 15:07:23 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Commerical Privacy Bill of Rights]]></category>
		<category><![CDATA[Data Security and Breach Notification Act]]></category>
		<category><![CDATA[Do-Not-Track Online Act]]></category>
		<category><![CDATA[privacy legislation]]></category>
		<category><![CDATA[Science and Transportation Committee]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=699</guid>
		<description><![CDATA[At the recent data security and privacy hearing held by the Senate Commerce, Science and Transportation Committee, there appeared to be widespread agreement that national data breach laws are needed.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F08%2F02%2Fsecurity-vs-commerce-striking-a-balance%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Commerical+Privacy+Bill+of+Rights,Data+Security+and+Breach+Notification+Act,Do-Not-Track+Online+Act,privacy+legislation,Science+and+Transportation+Committee&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/08/data-breach-laws.jpg"><img class="aligncenter size-full wp-image-701" title="data breach laws" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/08/data-breach-laws.jpg" alt="" width="448" height="252" /></a></p>
<p>Amidst this time of continuous, high-profile data breaches, lawmakers are scrambling to pass privacy legislation with teeth – the kind of bite that will really push companies to strengthen their <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">data security measures</a> and safeguard some customer data from even being collected or shared.  At the recent data security and privacy hearing held by the <a rel="”nofollow” nofollow" href="http://commerce.senate.gov/public/index.cfm?p=Hearings&amp;ContentRecord_id=e2c2a2ca-91d6-48a2-b5ea-b5c4104bdb97#hearingParticipants" target="_blank" class="broken_link">Senate Commerce, Science and Transportation Committee</a>, there appeared to be widespread agreement that national data breach laws are needed; the question is how to balance privacy regulations with the commercial interests of Internet businesses.</p>
<p>Three major bills currently circulating in the Senate attempt to address this delicate balance:</p>
<ol>
<li>The bipartisan <a rel="”nofollow” nofollow" href="http://online.wsj.com/article/SB10001424052748703385404576258942268540486.html" target="_blank" class="broken_link">Commercial Privacy Bill of Rights</a>, led by Senators John Kerry and John McCain, would impose new restrictions on companies that collect personal data from consumers, including seeking permission from consumers before collecting and sharing sensitive religious, medical and financial data with third party entities.</li>
<li>The <a rel="”nofollow” nofollow" href="http://www.infosecurity-us.com/view/18750/senators-introduce-national-data-breach-notification-legislation/" target="_blank" class="broken_link">Data Security and Breach Notification Act</a>, led by Committee Chairman Jay Rockefeller and Mark Pryor, would require companies that own or collect sensitive customer data to undertake “reasonable” security measures to protect consumer privacy, alert customers within a set timeframe when their data has been breached, and entitle customers affected by a breach to two years of free credit monitoring or credit reporting services for two years.</li>
<li>The <a rel="”nofollow” nofollow" href="http://www.washingtonpost.com/blogs/post-tech/post/sen-rockefeller-introduces-do-not-track-bill-for-internet/2011/05/09/AF0ymjaG_blog.html" target="_blank" class="broken_link">Do-Not-Track Online Act</a>, also led by Senator Rockefeller, would allow customers to block the ability of companies to track their online activity.</li>
</ol>
<p>Which of these bills becomes law remains to be seen, and there is as yet <a rel="”nofollow” nofollow" href="http://www.eweek.com/c/a/IT-Infrastructure/Senate-Hearing-Shows-No-Broad-Consensus-on-Details-for-Privacy-Legislation-200017/" target="_blank" class="broken_link">no broad consensus</a> for the details of privacy legislation.  Nevertheless, the <a href="http://www.experian.com/blogs/data-breach/2011/06/28/is-a-national-data-breach-notification-law-finally-within-reach/" target="_blank">federal movement</a> towards greater consumer protection should please ordinary consumers, who largely agreed in a recent poll that they should be able to opt out of Internet tracking from a single location.  Consumer advocacy groups and even <a rel="”nofollow” nofollow" href="http://www.adweek.com/news/technology/kerry-gets-microsoft-intel-back-his-online-privacy-bill-126128" target="_blank" class="broken_link">big technology companies</a> have also expressed support for the legislative efforts, even if some business trade groups believe that the bills are overly restrictive.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/08/02/security-vs-commerce-striking-a-balance/&via=Experian_DBR&text=Security vs. Commerce: Striking a balance&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/08/02/security-vs-commerce-striking-a-balance/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Get ready for a new wave of breach notification laws</title>
		<link>http://www.experian.com/blogs/data-breach/2011/03/01/get-ready-for-a-new-wave-of-breach-notification-laws/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/03/01/get-ready-for-a-new-wave-of-breach-notification-laws/#comments</comments>
		<pubDate>Tue, 01 Mar 2011 18:15:10 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Fraud Resolution]]></category>
		<category><![CDATA[Data Accountability and Trust Act]]></category>
		<category><![CDATA[data breach notification laws]]></category>
		<category><![CDATA[privacy legislation]]></category>
		<category><![CDATA[Privacy Rights Clearinghouse]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=328</guid>
		<description><![CDATA[For businesses that don’t comply with these new regulations, stiff penalties will be added to the burdensome costs of breaches (and how can you even tabulate costs like the loss of public trust?)  The new regulations headed our way in 2011 provide one more reason for businesses to protect themselves from breaches, swiftly take action when a breach has been detected, and stay informed about the legal currents that are taking shape.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F03%2F01%2Fget-ready-for-a-new-wave-of-breach-notification-laws%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Accountability+and+Trust+Act,data+breach+notification+laws,privacy+legislation,Privacy+Rights+Clearinghouse&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/03/Legal_small.jpg"><img class="alignnone size-full wp-image-358" title="Legal" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/03/Legal_small.jpg" alt="Gavel and Legal Weights" width="558" height="370" /></a></p>
<p>According to <a href="http://www.privacyrights.org/" target="_blank" class="broken_link" rel="nofollow">Privacy Rights Clearinghouse</a>, at least 500 million sensitive records have been breached since 2005, and a survey by the <a rel="”nofollow” nofollow" href="http://www.law.berkeley.edu/4391.htm" target="_blank" class="broken_link">Samuelson Law, Technology &amp; Public Policy Clinic at the University of California, Berkeley</a> has shown that even with notification letters, 28% of consumers don’t understand the potential consequences of these breaches.  It’s a serious problem that just about every state in the country continues to address.</p>
<p>Years ago, California ushered in landmark privacy legislation with <a rel="”nofollow” nofollow" href="http://www.senatorsimitian.com/entry/ab_0700_security_breaches/" target="_blank" class="broken_link">AB 700: Security Breaches (2001)</a> that is now modeled by most other states.  Now that California has a new governor, a new bill <a rel="”nofollow” nofollow" href="http://www.senatorsimitian.com/entry/sb_0024_data_breach_notification/" target="_blank" class="broken_link">SB 24: Data Breach Notification (2011)</a> is being re-introduced which further strengthens <a rel="”nofollow”" href="../../../data-breach/data-breach-resources.html" target="_blank">notification requirements</a> when data breaches occur, establishing added standard information that all businesses must provide to consumers about the breach.</p>
<p>But California is just one state.  Along with national data privacy laws such as FACTA, HIPAA, and COPPA, there are currently 48 different <a rel="”nofollow” nofollow" href="http://www.ncsl.org/default.aspx?tabid=13489" target="_blank" class="broken_link">data breach notification laws</a><span style="text-decoration: underline;"> </span>in just about every state.  No wonder it’s tough for businesses to surf the tidal wave of legislation, especially if a company does business in different states.</p>
<p>A new law expected to be passed in 2011, the <a rel="”nofollow” nofollow" href="http://www.govtrack.us/congress/bill.xpd?bill=h111-2221" target="_blank" class="broken_link">Data Accountability and Trust Act</a>, or DATA, would supersede all state laws, to provide one standard across the board.  Provisions include requiring companies to notify consumers about breaches within 60 days, alert customers to specific information that has been compromised, report breaches to the credit bureaus if more than 5,000 accounts are compromised, and provide two years of <a href="../../../data-breach/data-breach-security.html" target="_blank" class="broken_link" rel="nofollow">credit monitoring</a> to consumers and a toll-free number to call for more information about the breach.</p>
<p>For businesses that don’t comply with these <a rel="”nofollow” nofollow" href="http://idtheft.about.com/od/leagalconcerns/a/DATA-Info.htm" target="_blank" class="broken_link">new regulations</a>, stiff penalties will be added to the burdensome costs of breaches (and how can you even tabulate costs like the loss of public trust?)  The new regulations headed our way in 2011 provide one more reason for businesses to protect themselves from breaches, swiftly take action when a breach has been detected, and stay informed about the legal currents that are taking shape.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/03/01/get-ready-for-a-new-wave-of-breach-notification-laws/&via=Experian_DBR&text=Get ready for a new wave of breach notification laws&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/03/01/get-ready-for-a-new-wave-of-breach-notification-laws/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>