DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Commentaries and Analyses

Article: Once More Unto the Breach: An Analysis of Legal, Technological and Policy Issues Involving Data Breach Notification Statutes

Posted on September 5, 2010 by Dissent

Dana Lesemann of the Howard University School of Law has an article of note in the Akron Intellectual Property Journal, Vol. 4, p. 203, 2010. Here’s the abstract: Companies facing the loss of a laptop or a compromised server have long waged battles on several fronts: investigating the source of the breach, identifying potentially criminal…

Read more

College Data Breaches Underscore Higher Ed Security Challenges

Posted on September 3, 2010 by Dissent

Brian Prince reports: Reports surfaced this week that the University of Virginia fell victim to a cyber-attack that stole nearly $1 million. Unfortunately for administrators at colleges and universities, their institutions are just as vulnerable to data breach woes as enterprises. According to reports, attackers used malware to steal online banking credentials for accounts belonging…

Read more

Email remains a major vector of enterprise data loss

Posted on September 2, 2010 by Dissent

Paul Mah reports: A new survey of some 261 U.S. enterprises with more than 1,000 employees has found that email remains the number one source of data loss risks. Indeed, 35 percent of companies say they investigated the exposure of confidential information via this medium in the last 12 months. Another 20 percent say they…

Read more

UK Information Commissioner (ICO) Enforcements and Website Hacks

Posted on August 31, 2010 by Dissent

“alexisfitzg” blogs: I did a brief analysis of the enforcement notices that have been handed out by the UK Information Commissioner (ICO) to organisations found to be in breach of the Data Protection Act. The idea was to see how many incidents were a result of a website hack (SQL Injection, XSS etc.) About 100…

Read more

Network security challenges faced by universities

Posted on August 28, 2010 by Dissent

H. Peter Felgentreff, President & CEO of NCP Engineering, discusses challenges faced by universities in balancing a secure and open network and makes some suggestions in this article on Help Net Security.

Read more

NC Office of the State Auditor: ESC employees violating copyright law on state computers

Posted on August 27, 2010 by Dissent

An audit by the North Carolina Office of the State Auditor indicates that what at least one employee in the Employment Security Commission (ESC) was doing on state computers and state time was, well, illegal. The report (pdf),  released yesterday, reveals: Our examination of computers and disk drives assigned to a Systems and Operations Analyst (Systems…

Read more
  • Previous
  • 1
  • …
  • 848
  • 849
  • 850
  • 851
  • 852
  • 853
  • 854
  • …
  • 896
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.