DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Commentaries and Analyses

Massachusetts Attorney General Reviews 2010 Data Breach and Data Security Regulations Compliance

Posted on January 5, 2011 by Dissent

Ellen M. Giblin writes: With the first anniversary of the Massachusetts Data Security Regulations, 201 CMR 17 (pdf)(“Regulations”), coming in March, the International Association of Privacy Professionals (IAPP) recently hosted a panel discussion providing direct access to the Massachusetts Attorney General’s Office and the Office of Consumer Affairs and Business Regulation to discuss their investigations…

Read more

Wikileaks As Security Breach

Posted on January 5, 2011 by Dissent

Ryan Calo writes, in part: The leak represents an appalling security breach—one that makes TJX look like a misplaced diary. As I argue in a previous post, the leak threatens a set of classic privacy harms. One of the central roles of privacy is to help preserve the conditions for intimacy. The leak means that leaders will…

Read more

Data Stewardship: Managing Personally Identifiable Information in Electronic Student Education Records

Posted on January 5, 2011 by Dissent

Data Stewardship: Managing Personally Identifiable Information in Electronic Student Education Records SLDS Technical Brief Guidance for Statewide Longitudinal Data Systems (SLDS) SLDS Technical BriefGuidance for Statewide Longitudinal Data Systems (SLDS) November 2010, Brief 2 NCES 2011-602 The growth of electronic student data in America’s education system has focused attention on the ways these data are…

Read more

ITRC 2010 Breach Report

Posted on January 3, 2011 by Dissent

The Identity Theft Resource Center has issued its end of year press release. It  includes some of the organization’s key findings and stresses the need for more information and mandated disclosures.  Breach reports by sector can be found on their site as well as their chronology of the breaches they recorded for 2010: The Identity…

Read more

Policy puts troops at risk for identity theft

Posted on January 3, 2011 by Dissent

Andrew Tilghman reports: U.S. troops may be among the most vulnerable Americans to identity theft. That’s because the U.S. military is overusing Social Security numbers and putting at risk troops’ most basic personal information, according to a recent report from several professors at the U.S. Military Academy at West Point, N.Y. It’s been a problem…

Read more

As 2010 draws to a close, data breach version

Posted on December 31, 2010 by Dissent

A breach involving paper records just became my last breach post for 2010. It seems somehow appropriate, as breaches involving paper records constitute over 20% of breaches I find out about but they’re often not taken as seriously, it seems, as breaches involving large electronic databases. Yet these types of breaches, which often go unreported,…

Read more
  • Previous
  • 1
  • …
  • 813
  • 814
  • 815
  • 816
  • 817
  • 818
  • 819
  • …
  • 876
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Hunters International to provide free decryptors for all victims as they shut down (1)
  • SEC and SolarWinds Seek Settlement in Securities Fraud Case
  • Cyberattacks Disrupt Iran’s Bread Distribution, Payments Remain Frozen
  • Hacker with ‘political agenda’ stole data from Columbia, university says
  • Keymous+ Hacker Group Claims Responsibility for Over 700 Global DDoS Attacks
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • DOJ investigates ex-ransomware negotiator over extortion kickbacks
  • Hackers Using PDFs to Impersonate Microsoft, DocuSign, and More in Callback Phishing Campaigns
  • One in Five Law Firms Hit by Cyberattacks Over Past 12 Months
  • U.S. Sanctions Russian Bulletproof Hosting Provider for Supporting Cybercriminals Behind Ransomware

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law
  • US healthcare offshoring: Navigating patient data privacy laws and regulations
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • Google Trackers: What You Can Actually Escape And What You Can’t
  • Oregon Amends Its Comprehensive Privacy Statute
  • Wisconsin Supreme Court’s Liberal Majority Strikes Down 176-Year-Old Abortion Ban

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.