Is3920 Lab 9 Essay

18814 Words Dec 1st, 2013 76 Pages
Order Code RL33199
Data Security Breaches:
Context and Incident Summaries
Updated May 7, 2007
Rita Tehan
Information Research Specialist
Knowledge Services Group
Data Security Breaches:
Context and Incident Summaries
Summary
Personal data security breaches are being reported with increasing regularity.
Within the past few years, numerous examples of data such as Social Security, bank account, credit card, and driver’s license numbers, as well as medical and student records have been compromised. A major reason for the increased awareness of these security breaches is a California law that requires notice of security breaches to the affected individuals. This law, implemented in July 2003, was the first of its kind in the
…show more content…
. . . . . . . . . . . 75
List of Tables
Table 1. Data Security Breaches in Businesses (2000-2007) . . . . . . . . . . . . . . . 11
Table 2. Data Security Breaches in Education (2000-2007) . . . . . . . . . . . . . . . . 26
Table 3. Data Security Breaches in Financial Institutions (2001-2007) . . . . . . . 47
Table 4. Data Security Breaches in Local, State, and Federal Government
(2003-2007) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Table 5. Data Security Breaches in Health Care (2003-2007) . . . . . . . . . . . . . . 70
1 For additional information on legislative proposals introduced after the VA data theft (and in light of several ongoing information security and information technology management issues at the VA), see CRS Report RL33612, Department of Veterans Affairs: Information
Security and Information Technology Management Reorganization, by Sidath Viranga
Panangala.
2 Graeme Newman and Megan McNally, Identity Theft Literature Review, National Criminal
Justice Reference Service (NCJRS), 2005, at [http://www.ncjrs.gov/pdffiles1/nij/grants/
210459.pdf].
Data Security Breaches:
Context and Incident Summaries
Introduction
Personal data security breaches are being reported with increasing regularity.
During the past few years, there have been numerous examples of hackers breaking into corporate, government, academic, and personal computers and compromising computer systems or stealing

Related Documents