<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; ProtectMyID</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/tag/protectmyid/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>Case closed: 8 Things you didn’t know about data breach litigation</title>
		<link>http://www.experian.com/blogs/data-breach/2012/05/22/case-closed-8-things-you-didn%e2%80%99t-know-about-data-breach-litigation/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/05/22/case-closed-8-things-you-didn%e2%80%99t-know-about-data-breach-litigation/#comments</comments>
		<pubDate>Tue, 22 May 2012 15:46:29 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[cyber-insurance]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[ProtectMyID]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1265</guid>
		<description><![CDATA[As data breaches have exploded in frequency and scale, it’s no surprise that corresponding lawsuits have also flourished.  Do these lawsuits have a common pattern?  A recent draft research paper, Empirical Analysis of Data Breach Litigation, takes a look at federal data breach lawsuits to assess the common characteristics. The findings were illuminating: The odds [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F05%2F22%2Fcase-closed-8-things-you-didn%25e2%2580%2599t-know-about-data-breach-litigation%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Cyber+Security,cyber-insurance,Data+Breach,ProtectMyID&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/05/litigation.jpg"><img class="aligncenter size-full wp-image-1267" title="litigation" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/05/litigation.jpg" alt="" width="474" height="240" /></a></p>
<p>As <a title="unlock data breach facts" href="http://www.experian.com/blogs/data-breach/2012/03/12/unlock-data-breach-facts/" target="_blank">data breaches</a> have exploded in frequency and scale, it’s no surprise that corresponding lawsuits have also flourished.  Do these lawsuits have a common pattern?  A recent draft research paper, <a title="empirical analysis of data breach litigation" href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1986461" target="_blank" class="broken_link" rel="nofollow">Empirical Analysis of Data Breach Litigation,</a> takes a look at federal <a title="data breach lawsuits" href="http://www.experian.com/blogs/data-breach/2012/01/10/quick-glance-data-breach-litigation-legislation-in-2012/" target="_blank">data breach lawsuits</a> to assess the common characteristics.</p>
<p>The findings were illuminating:</p>
<ol>
<li>The odds of a firm being sued in federal court are three and a half times greater when individuals suffer <a title="extended fraud resolution" href="http://www.experian.com/blogs/data-breach/2012/03/05/extended-fraud-resolution-is-the-new-standard/" target="_blank">financial harm</a>, but over six times lower when the firm provides free <a title="ProtectMyID Elite" href="http://www.experian.com/data-breach/identity-theft-monitoring.html" target="_blank">credit monitoring</a>.</li>
<li>The odds of a firm being sued from improperly disposing data are three times greater relative to breaches caused by lost/stolen data, and six times greater when the data breach involves the loss of financial information.</li>
<li>Defendants settle 30% more often when plaintiffs allege financial loss from a data breach or when faced with a certified class action suit.</li>
<li>Plaintiffs seeking statutory damages are not more likely to achieve a settlement.</li>
<li>The odds of a settlement are 10 times greater when the breach is caused by a cyber-attack, relative to lost or stolen hardware.</li>
<li>While the compromise of financial information led to more litigation, it does not appear to increase a plaintiff’s chance of a settlement. Instead, compromise of medical information is most strongly correlated with settlement.</li>
<li>Only about four percent of reported breaches result in federal litigation.</li>
<li>Of the federal actions coded, there are over 86 different kinds causes of data breach actions brought by plaintiffs for essentially the same kind of event.</li>
</ol>
<p>The report hopes that the research will serve as a useful guide to firms trying to determine the chances of exposure to a lawsuit and the likelihood of settlement.  Insurance markets might also find the report helpful as a measure for pricing <a title="cyber liability insurance" href="http://www.experian.com/blogs/data-breach/2011/06/14/cyber-liability-insurance-5-fast-facts/" target="_blank">cyber-insurance policies</a>, and plaintiffs and defense attorneys can be helped through insight into the trends around data breach litigation.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Experian Data Breach Resource Center" href="http://www.experian.com/data-breach/data-breach-information.html?WT.srch=ecd_dbres_blog_052212_article ">Explore Our Resource Center for Videos, Webinars, White Papers and More</a>!</div></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/05/22/case-closed-8-things-you-didn%e2%80%99t-know-about-data-breach-litigation/&via=Experian_DBR&text=Case closed: 8 Things you didn’t know about data breach litigation&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F05%2F22%2Fcase-closed-8-things-you-didn%25e2%2580%2599t-know-about-data-breach-litigation%2F&amp;title=Case%20closed%3A%208%20Things%20you%20didn%E2%80%99t%20know%20about%20data%20breach%20litigation" id="wpa2a_2"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/05/22/case-closed-8-things-you-didn%e2%80%99t-know-about-data-breach-litigation/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Where will you be on April 29, 2012?</title>
		<link>http://www.experian.com/blogs/data-breach/2012/04/27/where-will-you-be-on-april-29-2012/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/04/27/where-will-you-be-on-april-29-2012/#comments</comments>
		<pubDate>Fri, 27 Apr 2012 15:30:00 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[healthcare data breach]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[medical fraud]]></category>
		<category><![CDATA[ProtectMyID]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1140</guid>
		<description><![CDATA[﻿ Experian will be at the annual HCCA 2012 Compliance Institute conference at Caesar’s Palace in Las Vegas. This conference offers an important opportunity to meet industry professionals with solid credentials in a number of areas related to medical information and data security. Some of the topics to be addressed at the conference include healthcare [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F04%2F27%2Fwhere-will-you-be-on-april-29-2012%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=data+breach+response,healthcare+data+breach,HIPAA,medical+fraud,ProtectMyID&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;">﻿</p>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/04/caesars-palace-las-vegas.jpg"><img class="size-full wp-image-1143" title="Caesars Palace in Las Vegas" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/04/caesars-palace-las-vegas.jpg" alt="" width="512" height="340" /></a></p>
<p style="text-align: left;">Experian will be at the annual HCCA 2012 Compliance Institute conference at Caesar’s Palace in Las Vegas. This conference offers an important opportunity to meet industry professionals with solid credentials in a number of areas related to medical information and data security. Some of the topics to be addressed at the conference include healthcare reform, compliance effectiveness and HIPAA privacy/data breach.</p>
<p>Attendees at the Compliance Institute can choose from 128 sessions and 225 speakers. Special conference tracks address legal and regulatory issues and privacy and security concerns, as well as general compliance. Also offered are advanced discussion groups, industry immersions, speed networking and more. For more information, go to <a rel="nofollow" href="http://www.compliance-institute.org/" class="broken_link">http://www.compliance-institute.org/</a>.</p>
<p>Come and visit our booth. We’ll talk about ProtectMyID<sup>®</sup>, Surveillance Alerts<sup>TM</sup> and ProtectMyID<sup>®</sup> ExtendCARE<sup>TM</sup>, as well as other Experian products that can play a critical role in protecting your organization, informing patients of a data breach and helping your organization recover from an incident. You can also enter your name in a drawing for a chance to win a new iPad.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/04/27/where-will-you-be-on-april-29-2012/&via=Experian_DBR&text=Where will you be on April 29, 2012?&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F04%2F27%2Fwhere-will-you-be-on-april-29-2012%2F&amp;title=Where%20will%20you%20be%20on%20April%2029%2C%202012%3F" id="wpa2a_4"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/04/27/where-will-you-be-on-april-29-2012/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Extended fraud resolution is the new standard</title>
		<link>http://www.experian.com/blogs/data-breach/2012/03/05/extended-fraud-resolution-is-the-new-standard/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/03/05/extended-fraud-resolution-is-the-new-standard/#comments</comments>
		<pubDate>Mon, 05 Mar 2012 19:40:33 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Fraud Resolution]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[ProtectMyID]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1027</guid>
		<description><![CDATA[Customers see a data breach and the loss of their personal data as a threat to their security and finances, and with good reason. Identity theft occurs every four seconds in the United States, according to figures from the Federal Trade Commission. As consumers become savvier about protecting their personal data, they expect companies to [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F03%2F05%2Fextended-fraud-resolution-is-the-new-standard%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach+Notification,data+breach+response,Identity+Theft,Identity+Theft+Prevention,ProtectMyID&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/03/Privacy_hands.jpg"><img class="aligncenter size-full wp-image-1033" title="Privacy_hands" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/03/Privacy_hands.jpg" alt="" width="425" height="282" /></a></p>
<p>Customers see a data breach and the loss of their personal data as a threat to their security and finances, and with good reason. Identity theft occurs every four seconds in the United States, according to figures from the Federal Trade Commission.</p>
<p>As consumers become savvier about protecting their personal data, they expect companies to do the same. And to go the extra mile for them if a data breach occurs. That means providing protection that holds up under scrutiny. Protection that offers peace of mind, not just in the interim but years down the line.</p>
<p>The stronger the level of protection you provide to individuals affected in a breach, the stronger their brand loyalty. Just like with any product, consumers can tell the difference between valid protection products that work and ones that just don’t.</p>
<p>Experian® Data Breach Resolution takes care to provide the former, protection that works for your customers or employees affected in a breach and that reflects positively on you, as the company providing the protection.</p>
<p>Experian’s <a title="ProtectMyId Elite" href="http://www.experian.com/data-breach/identity-theft-monitoring.html" target="_blank"><span style="text-decoration: underline;">ProtectMyID® Elite</span></a> or <a title="ProtectMyId Alert" href="http://www.experian.com/data-breach/protectmyid-alert.html" target="_blank"><span style="text-decoration: underline;">ProtectMyID Alert</span></a> provides industry-leading identity protection and, now, extended fraud resolution care. ExtendCARE™ now comes standard with every ProtectMyID data breach redemption membership, at no additional cost to you or the member.</p>
<p>With ExtendCARE, the <a title="Identity theft resolution" href="http://www.experian.com/data-breach/data-compromise.html" target="_blank"><span style="text-decoration: underline;">identity theft resolution</span></a> portion of ProtectMyID remains active even when the full membership isn’t. ExtendCARE allows members to receive personalized assistance, not just advice, from an Identity Theft Resolution Agent. This high level of assistance is available any time identity theft occurs after individuals redeem their ProtectMyID memberships.</p>
<p>Extended protection from a global leader like Experian can put consumers’ minds at ease following a breach. If we can help you with pre-breach planning or data breach resolution, please contact us at 1 866 751 1323 or <a href="mailto:databreachinfo@experian.com?subject=Experian.com%20Contact%20Us%20Request">databreachinfo@experian.com</a>.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="ExtendCare by Experian" href="http://www.experian.com/data-breach/data-compromise.html?WT.srch=ecd_dbres_blog_030512_article ">Learn more about ExtendCare™</a> and see how Experian&#8217;s Fraud Resolution Agents can help you! </div></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/03/05/extended-fraud-resolution-is-the-new-standard/&via=Experian_DBR&text=Extended fraud resolution is the new standard&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F03%2F05%2Fextended-fraud-resolution-is-the-new-standard%2F&amp;title=Extended%20fraud%20resolution%20is%20the%20new%20standard" id="wpa2a_6"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/03/05/extended-fraud-resolution-is-the-new-standard/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Consequences following a data breach</title>
		<link>http://www.experian.com/blogs/data-breach/2012/01/25/consequences-following-a-data-breach/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/01/25/consequences-following-a-data-breach/#comments</comments>
		<pubDate>Wed, 25 Jan 2012 16:58:48 +0000</pubDate>
		<dc:creator>lponemon</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Fraud Resolution]]></category>
		<category><![CDATA[breach notification fatigue]]></category>
		<category><![CDATA[Data Breach Notification]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[healthcare data breach]]></category>
		<category><![CDATA[Ponemon Institute]]></category>
		<category><![CDATA[privacy legislation]]></category>
		<category><![CDATA[ProtectMyID]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=923</guid>
		<description><![CDATA[Our latest study, Aftermath of a Data Breach Study, was conducted to better understand how a data breach affects organizations over the long term.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F01%2F25%2Fconsequences-following-a-data-breach%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+notification+fatigue,Data+Breach+Notification,data+breach+response,healthcare+data+breach,Ponemon+Institute,privacy+legislation,ProtectMyID&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/01/security-1024x722.jpg"><img class="aligncenter size-full wp-image-938" title="security-1024x722" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/01/security-1024x722.jpg" alt="" width="553" height="390" /></a></p>
<p><em>Our guest blogger this week is Dr. Larry Ponemon, Chairman and Founder of the <a title="Ponemon Institute Website" href="http://www.ponemon.org/index.php" target="_blank" class="broken_link" rel="nofollow">Ponemon Institute</a>.</em></p>
<p>Our latest study, <a title="Ponemon Aftermath Study Landing Page" href="http://www.experian.com/PonemonAftermathStudy" target="_blank">Aftermath of a Data Breach Study</a>, was conducted to better understand how a data breach affects organizations over the long term. In this study, IT professionals weigh in on how their organizations dealt with a data breach that had both serious financial and reputational consequences. While we asked respondents to focus on just one breach, 85 percent say that their organizations had more than one breach involving customer/consumer data in the past 24 months. It is interesting to note that in many cases it took a serious data breach to make privacy and data protection a greater priority and allocate additional resources to the IT security function.</p>
<p>While many respondents were unable to determine the root cause of the data breach, there is a consensus among respondents that insider negligence is making their organizations vulnerable to a data breach. As a result, organizations are investing in training and awareness and technologies that minimize the human factor risk.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"> <a title="Ponemone Reputation of Data Breach Study" href="http://www.experian.com/innovation/business-resources/reputation-impact-data-breach.jsp?WT.srch=ecd_dbres_blog_012512_article ">Download the Ponemon Reputation Impact Study</a> to learn what executives are saying about how a data breach can affect the reputation and image of an organization.</div></div>
<p>The findings also show the concern organizations have about <a title="How data breaches harm reputations" href="http://www.experian.com/blogs/data-breach/2012/01/17/how-data-breaches-harm-reputations/" target="_blank">losing the loyalty</a> of their customers. Of the IT practitioners surveyed, few felt that prompt notification to victims was enough to reduce the negative consequences of the data breach. This suggests that compliance with data breach notifications laws in and of itself is not sufficient if an organization is concerned about customer loyalty and reputation. Other lessons learned from the data breach are to limit the amount of personal data collected, limit sharing with third parties and limit the amount of personal data stored. We invite you to read the <a title="Ponemon Aftermath Study Landing Page" href="http://www.experian.com/PonemonAftermathStudy" target="_blank">full report here</a>.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/01/25/consequences-following-a-data-breach/&via=Experian_DBR&text=Consequences following a data breach&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/01/25/consequences-following-a-data-breach/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Consumers yawn at healthcare fraud</title>
		<link>http://www.experian.com/blogs/data-breach/2011/03/29/consumers-yawn-at-healthcare-fraud/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/03/29/consumers-yawn-at-healthcare-fraud/#comments</comments>
		<pubDate>Tue, 29 Mar 2011 16:22:53 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Fraud Resolution]]></category>
		<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Medical Data Breach]]></category>
		<category><![CDATA[medical fraud]]></category>
		<category><![CDATA[Medical identity theft]]></category>
		<category><![CDATA[National Study on Medical Identity Theft]]></category>
		<category><![CDATA[Ponemon Institute]]></category>
		<category><![CDATA[ProtectMyID]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=404</guid>
		<description><![CDATA[Today's headlines trumpet yet another high-profile medical data breach, this time through Health Net.  This corporate catastrophe reminds us of the increasing hazard of medical fraud, which is the most expensive and time consuming to resolve of all types of identity theft .  The second annual National Study on Medical Identity Theft, fielded by the Ponemon Institute provides further insight into this pervasive problem and how it affects consumers.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F03%2F29%2Fconsumers-yawn-at-healthcare-fraud%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Consumer+Privacy,Medical+Data+Breach,medical+fraud,Medical+identity+theft,National+Study+on+Medical+Identity+Theft,Ponemon+Institute,ProtectMyID&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/03/Medical-Identity-Theft.jpg"><img class="aligncenter size-full wp-image-415" title="Medical Identity Theft" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/03/Medical-Identity-Theft.jpg" alt="" width="500" height="301" /></a></p>
<p>Today&#8217;s headlines trumpet yet another <strong><a rel="”nofollow” nofollow" href="http://latimesblogs.latimes.com/money_co/2011/03/health-net-inc-security-lapse-leads-to-loss-of-personal-information-for-nearly-2-million-current-and.html" target="_blank" class="broken_link">high-profile medical data breach</a></strong>, this time through <strong><a rel="”nofollow” nofollow" href="https://www.healthnet.com/portal/home.do" target="_blank" class="broken_link">Health Net</a></strong>.  The company&#8217;s nine missing computer drivers have exposed the records of 2 million policyholders, thus compromising personal information that includes addresses, Social Security numbers, financial data and other information about customers, employees and healthcare providers.  California insurance regulators are conducting <strong><a rel="”nofollow” nofollow" href="http://www.latimes.com/business/la-fi-0316-health-net-records-20110316,0,1660184.story" target="_blank" class="broken_link">multiple probes</a> </strong>to determine whether Health Net, which services 6 million policyholders nationwide, &#8220;did everything it could have done to avoid and appropriately remedy this security breakdown.&#8221;</p>
<p>This corporate catastrophe reminds us of the <strong><a href="http://www.experian.com/blogs/data-breach/2010/09/07/warning-medical-data-breaches-are-on-the-rise/" target="_blank">increasing hazard of medical fraud</a></strong>, which is the <strong><a href="http://www.experian.com/data-breach/wp-global-privacy-summit-presentation.html" target="_blank">most expensive and time consuming to resolve</a> </strong>of all types of identity theft[i].  The second annual National Study on Medical Identity Theft, fielded by the Ponemon Institute provides further insight into this pervasive problem and how it affects consumers.</p>
<p>Key finding include:</p>
<p><strong>Recognizing the importance of privacy does not equate to action:</strong></p>
<ul>
<li>Nearly 1.5 million Americans have been affected by medical identity theft</li>
<li>The average cost to resolve a case of medical identity theft is $20,663, up slightly from $20,160 in 2010</li>
<li>Nearly 70% of total respondents felt it is important to have personal control over medical records</li>
<li>Nearly 80% felt that <a href="http://www.experian.com/blogs/data-breach/2010/12/15/what-a-healthcare-business-can-do-to-prevent-medical-fraud/" target="_blank">healthcare organizations should ensure the privacy of personal medical records</a></li>
<li>Nearly half (49%) of past medical identity theft victims took no new steps to protect themselves after their own incident</li>
<li>50% of respondents did not report the incident to law enforcement or other legal authorities, up from 46% in 2010</li>
</ul>
<p><strong>Consumer indifference is fueled by lack of understanding of repercussions</strong></p>
<ul>
<li>Of those that failed to report an incident, 43% cited the lack of resulting harm and the desire to “not make it a big deal.” This is up from 37% in 2010</li>
<li>37% of respondents fear embarrassment as a result of medical identity theft more than loss of medical coverage (21%) or a diminished credit score (18%)</li>
</ul>
<p><strong>Consumers are uninformed of new healthcare reform policies</strong></p>
<ul>
<li>More than half of respondents (55%) are not familiar or have no knowledge of the <a rel="”nofollow” nofollow" href="http://www.healthcare.gov/" target="_blank" class="broken_link">new healthcare reform policies</a></li>
<li>79% are not aware of the plan to create a national electronic database of American’s health information</li>
<li>33% of respondents believe that a national electronic database will increase the risk of medical ID theft</li>
</ul>
<p><strong>Medical identity theft is a family affair</strong> <strong> </strong></p>
<ul>
<li>In many cases, the victim discovers the thief to be a relative and the crime is often not reported to authorities</li>
<li>The leading instance of medical identity theft was at the hands of a family member, accounting for 36% of all victim responses, making it the most common scenario by an overwhelming margin</li>
<li>According to 51% of respondents, the number one reason for not reporting the incident after discovery is because the victim knew the thief and did not want to report him or her</li>
</ul>
<p>Health Net is conducting its own investigation into its recent data breach, and regulators have praised the company for acting quickly to alert consumers about the incident.  Healthcare organizations are responsible for <a href="http://www.experian.com/data-breach/wp-about-medical-identity-theft-overview.html" target="_blank">protecting consumer privacy and reporting breaches</a>, but the National Study on Medical Identity Theft&#8217;s survey confirms that consumers need to play their own part in reporting incidents and helping healthcare companies protect private medical information.</p>
<hr size="1" />
<p>[i]2010 Global Privacy Summit Presentation: The Potential Damages and Consquences of Medical Identity Theft and Healthcare Data Breaches – Dr. Larry Ponemon</p>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/03/29/consumers-yawn-at-healthcare-fraud/&via=Experian_DBR&text=Consumers yawn at healthcare fraud&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/03/29/consumers-yawn-at-healthcare-fraud/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Identity theft protection insights</title>
		<link>http://www.experian.com/blogs/data-breach/2011/01/04/identity-theft-protection-insights/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/01/04/identity-theft-protection-insights/#comments</comments>
		<pubDate>Tue, 04 Jan 2011 18:59:20 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Fraud Resolution]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[fraud resolution]]></category>
		<category><![CDATA[identity theft protection]]></category>
		<category><![CDATA[ProtectMyID]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=257</guid>
		<description><![CDATA[Consumers who are part of a data breach may be more likely to experience identity theft. Learn about sources and consequences of identity theft and the benefits of ProtectMyID. Tweet]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F01%2F04%2Fidentity-theft-protection-insights%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=fraud+resolution,identity+theft+protection,ProtectMyID&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>Consumers who are part of a data breach may be more likely to experience identity theft. Learn about sources and consequences of identity theft and the benefits of ProtectMyID.</p>
<p><object id="flashObj" classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" width="486" height="412" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0"><param name="bgcolor" value="#FFFFFF" /><param name="flashVars" value="videoId=714731961001&amp;playerID=62043871001&amp;playerKey=AQ~~,AAAADnASG2k~,38M_2G_XuvcZuqWU-aIs2sCtG7dpIoPj&amp;domain=embed&amp;dynamicStreaming=true" /><param name="base" value="http://admin.brightcove.com" /><param name="seamlesstabbing" value="false" /><param name="allowFullScreen" value="true" /><param name="swLiveConnect" value="true" /><param name="allowScriptAccess" value="always" /><param name="src" value="http://c.brightcove.com/services/viewer/federated_f9?isVid=1" /><param name="name" value="flashObj" /><param name="flashvars" value="videoId=714731961001&amp;playerID=62043871001&amp;playerKey=AQ~~,AAAADnASG2k~,38M_2G_XuvcZuqWU-aIs2sCtG7dpIoPj&amp;domain=embed&amp;dynamicStreaming=true" /><param name="allowfullscreen" value="true" /><embed id="flashObj" type="application/x-shockwave-flash" width="486" height="412" src="http://c.brightcove.com/services/viewer/federated_f9?isVid=1" bgcolor="#FFFFFF" flashvars="videoId=714731961001&amp;playerID=62043871001&amp;playerKey=AQ~~,AAAADnASG2k~,38M_2G_XuvcZuqWU-aIs2sCtG7dpIoPj&amp;domain=embed&amp;dynamicStreaming=true" base="http://admin.brightcove.com" seamlesstabbing="false" allowfullscreen="true" swliveconnect="true" allowscriptaccess="always" name="flashObj"></embed></object></p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/01/04/identity-theft-protection-insights/&via=Experian_DBR&text=Identity theft protection insights&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F01%2F04%2Fidentity-theft-protection-insights%2F&amp;title=Identity%20theft%20protection%20insights" id="wpa2a_8"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/01/04/identity-theft-protection-insights/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>