Header graphic for print
Privacy Compliance & Data Security Information on Data Breach Prevention and the Appropriate Response

Tag Archives: Breach Notification

Stricter Data Privacy Requirements in Connecticut

Posted in Data Protection Law Compliance, Data Security Breach Response, Privacy Policy, Privacy Rights

On June 30, 2015, Connecticut Governor Dannel Malloy signed into law Senate Bill 949, “An Act Improving Data Security and Agency Effectiveness”, a data privacy and security bill that creates stricter data breach response requirements.  S.B. 949 specifies that an entity that experiences a data breach must give notice to those affected no “later than… Continue Reading

The FCC – A New Data Security Regulator?

Posted in Data Protection Law Compliance, Data Security Breach Response, Data Theft, Electronic Data Security, FCC Rules and Regulations, Privacy Rights, Regulatory Enforcement and Litigation

On October 24, the Federal Communications Commission (FCC) threw its hat into the data security regulation ring when it announced it intends to fine two telecommunications companies $10 million for allegedly failing to safeguard the personal information of their customers. Both TerraCom, Inc. (TerraCom) and YourTel America, Inc. (YourTel) allegedly collected customers’ personal information, including… Continue Reading

California Expands Breach Notification Law

Posted in Data Security Breach Response

California Governor Jerry Brown signed Senate Bill 46 (S.B. 46) (PDF) into law on Friday, September 27, 2013.  The new law expands the current breach notification requirement to include a known breach of a security system, not just a confirmed loss of Social Security, driver’s license numbers, credit card numbers, or medical and health insurance information.… Continue Reading

HACKED: 75,000 Social Security Numbers at Risk at University of Wisconsin

Posted in Data Theft

The University of Wisconsin-Milwaukee (“UWM”) announced on Wednesday that a malware-infected, university server was discovered on May 25th that allowed hackers, apparently seeking research data, to access several types of scanned documents. Included in the potentially accessed documents were student applications from past and present students, which applications contained Social Security numbers.