TOTAL: {[ getCartTotalCost() | currencyFilter ]} Update cart for total shopping_basket Checkout

The Privacy Advisor | Is the Upside of So Many Breaches the Lessons To Be Learned? Related reading: Reducing risks and valuing compliance with the European Data Protection Seal under the GDPR 

rss_feed

""

Scan the headlines from any recent weekend and you’re likely to see a common theme: Breaches abound, and the fallout from said breaches lingers long after any initial harm is done.

Take, for example, headlines in Courthouse News Service (CN) and The Register on Adobe’s settlement in a 2013 breach class-action, approved by U.S. District Court Judge Lucy Koh on August 13.

“Adobe is on the hook for $1.1 million in legal fees—and an undisclosed sum to users—amid class allegations that its ‘shoddy security protocols’ led to a massive data breach,” the CN report states, referencing the October 2013 incident where hackers accessed credit card information and login details for 38 million individuals.

JDSupra reports on a second class-action being filed in a separate breach case against Medical Informatics. The class-action alleges risk of identity theft and “actual injury, including identity theft, invasion of privacy, cost of monitoring credit accounts and the value of their personal information,” the report states, noting this class-action includes “a different twist,” with the named plaintiff alleging “her information has value and can be sold to third parties, and therefore, it is a form of currency that has been devalued as a result of the breach.”

Meanwhile, Uber has announced it plans to “significantly expand its security team as it seeks to soothe worries about data privacy, defend against hackers and even protect its offices and employees from physical attack,” CNBC reports. This marks the latest step Uber has taken following a February incident where “the personal information of about 50,000 Uber drivers had been accessed in a data breach by an unknown party,” the report states.

And then there are the new breach reports to make headlines just in the past few days, including:

 If there’s an upside to all this bad news about breaches, perhaps it’s the opportunities for privacy pros to look at how other organizations have handled breaches well—or poorly—and build on those lessons learned.

The IAPP’s “Managing Your Data Breach: Maximizing the Relationships That Count To Manage Costs and Business Impact” focuses on those involved in breach preparedness and response to help privacy pros choose the best way to utilize those resources.

And Fourth Source reports, amidst the almost relentless “mega-breach” headlines, “security issues are the logical outcome of pervasive connectivity: If everything is connected, everything is vulnerable.” Instead of being caught off-guard, the report states, “Every business, nonprofit or other organization that holds personal data needs to reevaluate the security of its IT infrastructure and start asking itself: How can we mitigate risk?”

Want more tips and tools on responding to a breach? The IAPP Resource Center includes a package of tools, insights and information on data breach response—including our recent available here.

Comments

If you want to comment on this post, you need to login.