{"id":284,"date":"2006-06-04T11:01:26","date_gmt":"2006-06-04T11:01:26","guid":{"rendered":"http:\/\/irdial.com\/blogdial\/?p=284"},"modified":"2006-06-04T11:01:26","modified_gmt":"2006-06-04T11:01:26","slug":"a-chronology-of-data-breachesreported-since-the-choicepoint-incident","status":"publish","type":"post","link":"https:\/\/irdial.com\/blogdial\/?p=284","title":{"rendered":"A Chronology of Data BreachesReported Since the ChoicePoint Incident"},"content":{"rendered":"<blockquote>\n<p align=\"left\" class=\"style2\"><span class=\"text14-black style11 style2\"> The data breaches noted <a href=\"http:\/\/www.privacyrights.org\/ar\/ChronDataBreaches.htm#CP\">below<\/a> have been reported because the personal information compromised includes data elements useful to identity thieves, such as Social Security numbers, account numbers, and driver&#8217;s license numbers. A few breaches that do NOT expose such sensitive information have been included in order to underscore the variety and frequency of data breaches. However, we have not included the number of individuals affected in such breaches in the <a href=\"http:\/\/www.privacyrights.org\/ar\/ChronDataBreaches.htm#Total\">total<\/a> because we want this compilation to reflect breaches that expose individuals to identity theft as well as breaches that qualify for disclosure under state laws. <\/span><\/p>\n<p align=\"left\" class=\"style2\"><span class=\"text14-black style11 style2\"> For tips on what to do if your personal information has been exposed due to a security breach, read <a href=\"http:\/\/www.privacyrights.org\/fs\/fs17b-securitybreach.htm\">our guide<\/a>.<\/span><\/p>\n<p>The catalyst for reporting data breaches to the affected individuals has been the California law that requires notice of security breaches, the first of its kind in the nation, implemented July 2003.<br \/>\n<a href=\"http:\/\/www.privacyrights.org\/ar\/SecurityBreach.htm\">www.privacyrights.org\/ar\/SecurityBreach.htm<\/a><br \/>\n<a href=\"http:\/\/www.privacy.ca.gov\/recommendations\/secbreach.pdf\">www.privacy.ca.gov\/recommendations\/secbreach.pdf<\/a><\/p>\n<p align=\"left\" class=\"text14-black style11 style2\">This <a href=\"http:\/\/www.privacyrights.org\/ar\/ChronDataBreaches.htm#CP\">chronology below<\/a> begins with ChoicePoint&#8217;s 2\/15\/05 announcement of its data breaches because it was a watershed event in terms of disclosure to the affected individuals. Since then, the &#8220;best practice&#8221; has been to disclose breaches to individuals nationwide &#8212; in a sense, adopting California&#8217;s notice requirement nationally.<\/p>\n<p align=\"left\" class=\"text14-black style11 style2\">In the meantime, at least 23 states have passed laws requiring  that individuals be notified of security breaches. For a list of states enacting security breach and freeze laws, visit the Consumers Union web site here:<\/p>\n<p>Security breach notice  laws: <a href=\"http:\/\/www.consumersunion.org\/campaigns\/Breach_laws_May05.pdf\">www.consumersunion.org\/campaigns\/Breach_laws_May05.pdf<\/a><br \/>\nSecurity freeze laws: <a href=\"http:\/\/www.consumersunion.org\/campaigns\/learn_more\/002355indiv.html\">www.consumersunion.org\/campaigns\/learn_more\/002355indiv.html <\/a><br \/>\nState security freeze bills pending in 2006: <a href=\"http:\/\/www.consumersunion.org\/campaigns\/Breach_laws_May05.pdf\">www.consumersunion.org\/campaigns\/\/learn_more\/002906indiv.html <\/a><br \/>\nAnd visit the PIRG site here: <a href=\"http:\/\/www.pirg.org\/consumer\/credit\/statelaws.htm\">www.pirg.org\/consumer\/credit\/statelaws.htm<\/a>.<\/p>\n<p align=\"left\" class=\"style1\"><span class=\"text14-black\">Congress is considering several bills this year in which security breach notices would be mandated nationwide. See <a href=\"http:\/\/thomas.loc.gov\/\">http:\/\/thomas.loc.gov<\/a>. See also EPIC&#8217;s bill-track list, <a href=\"http:\/\/www.epic.org\/privacy\/bill_track.html\">www.epic.org\/privacy\/bill_track.html<\/a>.<\/span><\/p>\n<p align=\"left\" class=\"text14-black style11 style2\">Here are other sources for security breach information:<\/p>\n<ul class=\"style11\">\n<li class=\"style2\"><span class=\"text14-black\">Adam Shostack&#8217;s blog, <a href=\"http:\/\/www.emergentchaos.com\/archives\/cat_breaches.html\">www.emergentchaos.com\/archives\/cat_breaches.html<\/a><\/span><\/li>\n<li class=\"style2\"><span class=\"text14-black\">Attrition, <a href=\"http:\/\/www.attrition.org\/errata\/dataloss.html\">www.attrition.org\/errata\/dataloss.html<\/a> (includes links to news articles and offers free list-serve on the latest breaches,            <a href=\"http:\/\/attrition.org\/security\/dataloss.html\">http:\/\/attrition.org\/security\/dataloss.html<\/a>)<\/span><\/li>\n<li><span class=\"text14-black style2\">World Privacy Forum,     Security Breaches in the Digital Medical Environment (scroll to section D of testimony), <a href=\"http:\/\/www.worldprivacyforum.org\/testimony\/NCVHStestimony_092005.html\">www.worldprivacyforum.org\/testimony\/NCVHStestimony_092005.html<\/a><\/span><\/li>\n<li class=\"text14-black\">Security Breach Resources (Chris Walsh)<br \/>\n<a href=\"http:\/\/www.cwalsh.org\/BreachInfo\">www.cwalsh.org\/BreachInfo <\/a><\/li>\n<\/ul>\n<p>[&#8230;]<\/p><\/blockquote>\n<p>A HUGE list of breaches follows. Go to the site to read it!<\/p>\n<blockquote><p>[&#8230;]<\/p>\n<p><strong>TOTAL<\/strong> <strong>83,114,945<\/strong><\/p>\n<p>[&#8230;]<\/p>\n<p><a href=\"http:\/\/www.privacyrights.org\/ar\/ChronDataBreaches.htm\">http:\/\/www.privacyrights.org\/ar\/ChronDataBreaches.htm<\/a><\/p><\/blockquote>\n<p>And there, once again, you have it.<\/p>\n<p>Britain does not have a unique personal identifier like the american &#8216;Social Security Number&#8217; (SSN). The British are therefore safe from this type of security breach.<\/p>\n<p>If the UK rolls out the &#8216;National Identiy Register&#8217; (NIR) then every single person living in the UK will have their Identity compromised in the way described by that website. It is not a question of &#8216;if&#8217; but of when.<\/p>\n<p>Britian should not introduce the NIR. The British are safer from the threat of identity theft if they do not have a single all encompassing number issued to them.<\/p>\n<p>You must under no circumstances enter the NIR should it be introduced. That is the only way you can be sure that your identity will remain safe.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The data breaches noted below have been reported because the personal information compromised includes data elements useful to identity thieves, such as Social Security numbers, account numbers, and driver&#8217;s license numbers. A few breaches that do NOT expose such sensitive information have been included in order to underscore the variety and frequency of data breaches. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[34],"tags":[],"_links":{"self":[{"href":"https:\/\/irdial.com\/blogdial\/index.php?rest_route=\/wp\/v2\/posts\/284"}],"collection":[{"href":"https:\/\/irdial.com\/blogdial\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/irdial.com\/blogdial\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/irdial.com\/blogdial\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/irdial.com\/blogdial\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=284"}],"version-history":[{"count":0,"href":"https:\/\/irdial.com\/blogdial\/index.php?rest_route=\/wp\/v2\/posts\/284\/revisions"}],"wp:attachment":[{"href":"https:\/\/irdial.com\/blogdial\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=284"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/irdial.com\/blogdial\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=284"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/irdial.com\/blogdial\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=284"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}