DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Entities need to up their game when it comes to breach disclosures

Posted on June 4, 2012 by Dissent

Help Net Security reports on a new Experian/Ponemon survey, “Consumers confused about data breaches.” Over 60% of respondents had trouble understanding the notification letters or felt the entity did not give them sufficient details.

One take-home message is what I’ve been saying for years: breach notifications need to be written in plain language and include sufficient detail.  While overall, my impression is that the quality of notifications has generally increased over the years, and that more consumers are dissatisfied because they’ve become more savvy about what they want to know, there are still many notices that do not answer the questions consumers are likely to have. Here’s my list/opinion as to what elements should be included in plain language:

1. What happened?
If an outsider was involved, what do you know about them? If a contractor or business associate or vendor was involved, where they following procedures you had specified in a contract? If an insider was involved, have they been arrested?

2. How did it happen?

3. When did it (first) happen and for how long did this breach go on?

4. When did you first find out about this?

5,  How did you find out?

6. What kinds of information about me are involved?

7. What should I do?

8. What will you do to help restore me to my pre-breach state?

9, What will you do to reduce the likelihood that this or another breach will happen again?

The survey points out that notifications should also include an estimate of risk of harm. That’s something that I’ve had recurring concerns about because many notifications seem to be so reassuring that individuals may not act to protect themselves even though their odds of becoming a victim of fraud or ID theft have increased. Consider even a “crime of opportunity” where a laptop with sensitive data is stolen in a smash and grab. The thief may have no interest in the data, true, but when the thief sells the laptop, can we say the same for the person who purchases it after it’s been inexpertly wiped (if it’s been wiped at all)?


Related:

  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Confidence in ransomware recovery is high but actual success rates remain low
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • Resource: NY DFS Issues New Cybersecurity Guidance to Address Risks Associated with the Use of Third-Party Service Providers
  • Bombay High Court Orders Department of Telecommunications to Block Medusa Accounts After Generali Insurance Data Breach
  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
Category: Commentaries and Analyses

Post navigation

← veluwe.info hacked, 200+ accounts leaked
Employee of IT contractor sentenced to 57 months in prison for stealing info on law and CPA firms’ clients →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.