Preview

Data Breach Research Paper

Powerful Essays
Open Document
Open Document
4412 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Data Breach Research Paper
Introduction

Numerous data breaches and computer intrusions have been disclosed by the nation’s largest data brokers, retailers, educational institutions, government agencies, health care entities, financial institutions, and Internet businesses. A data breach may occur when there is a loss or theft of, or other unauthorized access to, data containing sensitive personal information that results in the potential compromise of the confidentiality or integrity of data. Sensitive personal information generally includes an individual’s name, address, or telephone number, in conjunction with the individual’s Social Security number, driver’s license number, account number, credit or debit card number, or a personal identification number or password. Breach notification laws enacted by many states require the disclosure of security breaches involving sensitive personal information (Stevens, 2008).

The story of Health Net of Connecticut ("Health Net") is instructive.

In May 2009, Health Net discovered that it had lost a computer hard drive containing the personal health information of approximately 500,000 Connecticut residents. In January 2010, the State of Connecticut commenced a lawsuit against Health Net alleging that it had failed in a timely manner to notify residents and state authorities on this data security breach incident. The suit alleged violations of the Health Insurance Portability and Accountability Act ("HIPAA"), the Connecticut data breach law and the Connecticut Unfair Trade Practice Act. Under the terms of a stipulated judgment entered into on July 6, 2010, Health Net agreed to pay $250,000 in penalties and implement a corrective action plan.

In November 2010, the Connecticut Insurance Department and Health Net settled a separate enforcement action commenced against Health Net arising out of the same data security breach incident. Under the terms of that settlement agreement, Health Net agreed to pay $350,000 in penalties and to provide two years



References: Banham, R. (2012) “Where the Money Is, And the Security Isn’t: Cyber thieves are increasingly targeting small and midsize businesses, and why not? Most SMBs do little to protect themselves”. Retrieved from www.CFO.com Cate, F.H Guffin, P. (2012) “United States: Data Security Breach Notification Requirements in the United States: What You Need to Know” Retrieved from www.mondaq.com Heussner , K.M Mintz Levin (2011) “State Data Security Breach Notification Laws” Retrieved from www.Mintz.com Picanso, K.E., (2006) “Protecting Information Security under a Uniform Data Breach Notification Law” Fordham Law Review, Volume 75 | Issue 1 Article 9 Romanosky, S., Telang, R., & Acquisti, A. (2010) “Do Data Breach Disclosure Laws Reduce Identity Theft?” The Heinz College: Carnegie Mellon University Simon, J.M Stevens, G.M. (2008) “CRS Report for Congress: Federal Information Security and Data Breach Notification Laws”, Congressional Research Service van Eecke, P., Craig, C., and Halpert, J “Should you share breach information” (2011) Retrieved March 3, 2012 from www.networkworld.com

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Technology has rapidly advanced, affecting standards on privacy, telecommunications, and criminal law. Every day, we encounter unexpected consequences of data flows that could not have happened a few years ago.…

    • 786 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Grammarly Report generated on Tue, 09 Dec 2014 03:29 Grammarly DOCUMENT Page 1 of 4 SCORE LAW 531 Wk 6 IRAC Brief 6.2 98 of 100 Final Draft ISSUES FOUND IN THIS TEXT 1 PLAGIARISM 0% Contextual spelling 0 No errors Grammar 0…

    • 808 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    In addition, organizations constantly face legal, ethical, and regulatory requirements from governments, business partners, and others they work with. These will add additional factors when weighing the costs and benefits of different solutions to information security risks. In fact, these requirements may even make some risks more important, often because a company will not want to get in trouble with a government even though they might normally live with the risk they are being forced to resolve through regulations. Understanding the various laws that will affect data is of prime importance to any security…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Blue Cross Blue Shield of Tennessee (BCBST) has agreed to pay the U.S. Department of Health and Human Services (HHS) $1,500,000 to settle potential violations of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy and Security Rules, Leon Rodriguez, Director of the HHS Office for Civil Rights (OCR), announced today. BCBST has also agreed to a corrective action plan to address gaps in its HIPAA compliance program. The enforcement action is the first resulting from a breach report required by the Health Information Technology for Economic and Clinical Health (HITECH) Act Breach Notification Rule.…

    • 554 Words
    • 2 Pages
    Good Essays
  • Good Essays

    “This bill would require state agencies and businesses that maintain computer data systems that contain personal information to disclose, as specified, any breach of the security of the systems, as defined, to any person whose personal information was, or may have been, accessed by an unauthorized person. This bill would also make a statement of legislative findings and declarations regarding privacy and financial security (SB 1386 Senate Bill – AMENDED, 2000).”…

    • 577 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    BIS Week 3 Assignment

    • 446 Words
    • 2 Pages

    Data breaches and cyber-attacks frequently has dramatically increased in recent years, with the advancement of technology and the prevalence of more “cloud” storage and remote access servers. In Mr. Horton’s article, he remarks on the high cost a data breach can have on both finances and company’s reputation. (Horton, 2014) Citing the Ponemon Institute’s 2013 Cost of Data Breach Study, Horton goes on to state that “data breaches can cost an average organization more than $5 million per incident. (Ponemon Institute, 2013)…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Breach notification law letters have contributed to the importance of information security throughout every business level of an organization. Every department of a corporation has the responsibility to detect, monitor, investigate and report breaches; whether a data or physical breach. Reports of breaches help not only IT security officers maintain awareness, but also every other member of an organization as well.…

    • 254 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    HIPAA (1996) Compliance

    • 657 Words
    • 3 Pages

    Follow-up with employees involved in the breach. Recommend changes to ensure data security and privacy compliance under HIPAA (1996) Respond to the situations that meets HIPAA (1996) privacy, security, and HITECH (2009) breach notice requirements.  Physical safeguards  Technical safeguards  Technical policies  Network, or transmission, security Explain the ethical issues that relate to this situation …

    • 657 Words
    • 3 Pages
    Powerful Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Whitman, M. E. (2011). Readings and Cases in Information Security: Law and Ethics. New York, NY: Cengage Learning.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Better Essays

    To begin with the enforcement movement coming about because of HITECH Breach Notification Rule: Blue Cross Blue Shield of Tennessee (BCBST) has consented to pay the U.S. Bureau of Health and Human Services (HHS) $1,500,000 to settle potential infringement of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy and Security Rules, Leon Rodriguez, Director of the HHS Office for Civil Rights (OCR), affirmed today. BCBST has likewise consented to…

    • 1284 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Wojna, Lisa. Identity Theft in Canada. Outrageous Tales and Preventions Strategies, 2012. Wed. 8 October 2014…

    • 2325 Words
    • 10 Pages
    Satisfactory Essays
  • Good Essays

    But, the actual compromise data did not fall into the criteria of what the law required for notifications. This created an ethical dilemma for the Executive team, just because the law states that notification does not require notification for the data type in the breach. But, the heavy-handed control of the Executive staff team, he forced public notification that a larger number of data elements were compromised, under protest of other Officers. Even though the first notification was not correct, the media decided to combine both notifications and came to the conclusion of how many data elements were access during the breach. With the prevailing news stories, correct or not, Target’s reputation and sales suffered, Chief Marketing Officer Jeffrey Jones summed it up the best, “That’s hammering us” (Kinicki & Williams, 2013, pg. 37,…

    • 823 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Data breaches that could lead to identity theft, by sector - the danger of data breaches are of particular importance for organizations that store and manage large amounts of personal information. Not only can compromises that result in the loss of personal data undermine customer and institutional confidence, result in costly damage to an organization’s reputation, and result in identity theft that may be costly for individuals to recover from, they can also be financially debilitating to organizations.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Web Developer

    • 331 Words
    • 2 Pages

    Everything today is digital and people are depending on organizations, both commercial and government, to protect information that is shared. Unfortunately this isn't always reliable.…

    • 331 Words
    • 2 Pages
    Satisfactory Essays