DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

One year after mandatory breach reporting was enacted in Canada, there are 6 times as many breach reports

Posted on November 2, 2019 by Dissent

One year ago, Canadian businesses became subject to increased data breach notification requirements under PIPEDA (the Personal Information Protection and Electronic Documents Act).  Rather than deciding whether to voluntarily disclose or report breaches, they were now required to report all breaches that pose a significant risk of harm to individuals to the Office of the Privacy Commissioner. They are also required to notify the affected individuals.

So what have the breach report numbers looked like over the past 12 months? Here are some key statistics from a recent report by OPC, who received 680 reports — six times the volume submitted in the 12 months prior to the new requirement going into effect.

  • The number of Canadians affected by a data breach is well over 28 million.
  • The majority of reported breaches – 58% – involved unauthorized access. Employee snooping and social engineering hacks were key factors in these types of breaches.
  • One in four incidents involved social engineering attacks such as phishing and impersonation.
  • More than one in five incidents involved accidental disclosure.
  • Loss of hardware or paper records accounted for 12% of the breach reports.
  • Theft of documents, computers or computer components accounted for 8% of the breach reports.

You can read the full blog post here.

Category: Commentaries and AnalysesNon-U.S.Of Note

Post navigation

← Ca: Digital pirates search for prey in Southwestern Ontario
The First BlueKeep Mass Hacking Is Finally Here—but Don’t Panic →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Chinese Hackers Hit Drone Sector in Supply Chain Attacks
  • Coinbase says hackers bribed staff to steal customer data and are demanding $20 million ransom
  • $28 million in Texas’ cybersecurity funding for schools left unspent
  • Cybersecurity incident at Central Point School District 6
  • Official Indiana .gov email addresses are phishing residents
  • Turkish Group Hacks Zero-Day Flaw to Spy on Kurdish Forces
  • Cyberattacks on Long Island Schools Highlight Growing Threat
  • Dior faces scrutiny, fine in Korea for insufficient data breach reporting; data of wealthy clients in China, South Korea stolen
  • Administrator Of Online Criminal Marketplace Extradited From Kosovo To The United States
  • Twilio denies breach following leak of alleged Steam 2FA codes

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • CFPB Quietly Kills Rule to Shield Americans From Data Brokers
  • South Korea fines Temu for data protection violations
  • The BR Privacy & Security Download: May 2025
  • License Plate Reader Company Flock Is Building a Massive People Lookup Tool, Leak Shows
  • FTC dismisses privacy concerns in Google breakup
  • ARC sells airline ticket records to ICE and others
  • Clothing Retailer, Todd Snyder, Inc., Settles CPPA Allegations Regarding California Consumer Privacy Act Violations

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.