Cybertheft
   HOME

TheInfoList



OR:

A data breach, also known as data leakage, is "the unauthorized exposure, disclosure, or loss of
personal information Personal data, also known as personal information or personally identifiable information (PII), is any information related to an identifiable person. The abbreviation PII is widely used in the United States, but the phrase it abbreviates has fou ...
". Attackers have a variety of motives, from financial gain to
political activism Activism consists of efforts to promote, impede, direct or intervene in social, political, economic or environmental reform with the desire to make changes in society toward a perceived common good. Forms of activism range from mandate build ...
,
political repression Political repression is the act of a state entity controlling a citizenry by force for political reasons, particularly for the purpose of restricting or preventing the citizenry's ability to take part in the political life of a society, thereby ...
, and
espionage Espionage, spying, or intelligence gathering, as a subfield of the intelligence field, is the act of obtaining secret or confidential information ( intelligence). A person who commits espionage on a mission-specific contract is called an ...
. There are several technical root causes of data breaches, including accidental or intentional disclosure of information by insiders, loss or theft of
unencrypted In cryptography, plaintext usually means unencrypted information pending input into cryptographic algorithms, usually encryption algorithms. This usually refers to data that is transmitted or stored unencrypted. Overview With the advent of comp ...
devices, hacking into a system by exploiting software vulnerabilities, and social engineering attacks such as
phishing Phishing is a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware. Phishing attacks have become increasingly sophisticate ...
where insiders are tricked into disclosing information. Although prevention efforts by the company holding the data can reduce the risk of data breach, it cannot bring it to zero. The first reported breach was in 2002 and the number occurring each year has grown since then. A large number of data breaches are never detected. If a breach is made known to the company holding the data, post-breach efforts commonly include containing the breach, investigating its scope and cause, and notifications to people whose records were compromised, as required by law in many jurisdictions. Law enforcement agencies may investigate breaches, although the hackers responsible are rarely caught. Many criminals sell data obtained in breaches on the
dark web The dark web is the World Wide Web content that exists on darknets ( overlay networks) that use the Internet but require specific software, configurations, or authorization to access. Through the dark web, private computer networks can communica ...
. Thus, people whose personal data was compromised are at elevated risk of
identity theft Identity theft, identity piracy or identity infringement occurs when someone uses another's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. ...
for years afterwards and a significant number will become victims of this crime.
Data breach notification laws Security breach notification laws or data breach notification laws are laws that require individuals or entities affected by a data breach, unauthorized access to data, to notify their customers and other parties about the breach, as well as take ...
in many jurisdictions, including all
states of the United States The United States, United States of America is a federal republic consisting of 50 U.S. state, states, a Capital districts and territories#United States, federal district (Washington, D.C., the capital city of the United States), five major ...
and
European Union member states The European Union (EU) is a political and economic union of Lists of member states of the European Union, 27 member states that are party to the EU's Treaties of the European Union, founding treaties, and thereby subject to the privileges and ...
, require the notification of people whose data has been breached. Lawsuits against the company that was breached are common, although few victims receive money from them. There is little empirical evidence of economic harm to firms from breaches except the direct cost, although there is some evidence suggesting a temporary, short-term decline in
stock price A share price is the price of a single share of a number of saleable equity shares of a company. In layman's terms, the stock price is the highest amount someone is willing to pay for the stock, or the lowest amount that it can be bought for. B ...
.


Definition

A data breach is a violation of "organizational, regulatory, legislative or contractual" law or policy that causes "the unauthorized exposure, disclosure, or loss of
personal information Personal data, also known as personal information or personally identifiable information (PII), is any information related to an identifiable person. The abbreviation PII is widely used in the United States, but the phrase it abbreviates has fou ...
". Legal and contractual definitions vary. Some researchers include other types of information, for example
intellectual property Intellectual property (IP) is a category of property that includes intangible creations of the human intellect. There are many types of intellectual property, and some countries recognize more than others. The best-known types are patents, co ...
or
classified information Classified information is confidential material that a government deems to be sensitive information which must be protected from unauthorized disclosure that requires special handling and dissemination controls. Access is restricted by law or ...
. However, companies mostly disclose breaches because it is required by law, and only personal information is covered by
data breach notification laws Security breach notification laws or data breach notification laws are laws that require individuals or entities affected by a data breach, unauthorized access to data, to notify their customers and other parties about the breach, as well as take ...
.


Prevalence

The first reported data breach occurred on 5 April 2002 when 250,000
social security numbers In the United States, a Social Security number (SSN) is a nine-digit number issued to U.S. citizens, permanent residents, and temporary (working) residents under section 205(c)(2) of the Social Security Act, codified as . The number is issued t ...
collected by the
State of California California () is a U.S. state, state in the Western United States that lies on the West Coast of the United States, Pacific Coast. It borders Oregon to the north, Nevada and Arizona to the east, and shares Mexico–United States border, an ...
were stolen from a data center. Before the widespread adoption of
data breach notification laws Security breach notification laws or data breach notification laws are laws that require individuals or entities affected by a data breach, unauthorized access to data, to notify their customers and other parties about the breach, as well as take ...
around 2005, the prevalence of data breaches is difficult to determine. Even afterwards, statistics per year cannot be relied on because data breaches may be reported years after they occurred, or not reported at all. Nevertheless, the statistics show a continued increase in the number and severity of data breaches that continues . In 2016, researcher
Sasha Romanosky Sacha, Sasha, or Sascha may refer to: People * Sasha (name), includes list of people with the name and the variants Sascha or Sacha Musicians * Sacha (singer), born Sacha Visagie, Canadian singer and songwriter * Sasha (DJ) (born 1969), born Alex ...
estimated that data breaches (excluding
phishing Phishing is a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware. Phishing attacks have become increasingly sophisticate ...
) outnumbered other security breaches by a factor of four.


Perpetrators

According to a 2020 estimate, 55 percent of data breaches were caused by
organized crime Organized crime is a category of transnational organized crime, transnational, national, or local group of centralized enterprises run to engage in illegal activity, most commonly for profit. While organized crime is generally thought of as a f ...
, 10 percent by
system administrators An IT administrator, system administrator, sysadmin, or admin is a person who is responsible for the upkeep, configuration, and reliable operation of computer systems, especially multi-user computers, such as servers. The system administra ...
, 10 percent by
end user In product development, an end user (sometimes end-user) is a person who ultimately uses or is intended to ultimately use a product. The end user stands in contrast to users who support or maintain the product, such as sysops, system administrato ...
s such as customers or employees, and 10 percent by states or state-affiliated actors. Opportunistic criminals may cause data breaches—often using
malware Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
or social engineering attacks, but they will typically move on if the security is above average. More organized criminals have more resources and are more focused in their targeting of particular data. Both of them sell the information they obtain for financial gain. Another source of data breaches are politically motivated hackers, for example
Anonymous Anonymous may refer to: * Anonymity, the state of an individual's identity, or personally identifiable information, being publicly unknown ** Anonymous work, a work of art or literature that has an unnamed or unknown creator or author * Anonym ...
, that target particular objectives. State-sponsored hackers target either citizens of their country or foreign entities, for such purposes as
political repression Political repression is the act of a state entity controlling a citizenry by force for political reasons, particularly for the purpose of restricting or preventing the citizenry's ability to take part in the political life of a society, thereby ...
and
espionage Espionage, spying, or intelligence gathering, as a subfield of the intelligence field, is the act of obtaining secret or confidential information ( intelligence). A person who commits espionage on a mission-specific contract is called an ...
. Often they use undisclosed zero-day vulnerabilities for which the hackers are paid large sums of money. The
Pegasus spyware Pegasus is spyware developed by the Israeli cyber-arms company NSO Group that is designed to be covertly and remotely installed on mobile phones running iOS and Android. While NSO Group markets Pegasus as a product for fighting crime and terro ...
—a no-click malware developed by the Israeli company
NSO Group NSO Group Technologies (NSO standing for Niv, Shalev and Omri, the names of the company's founders) is an Israeli cyber-intelligence firm primarily known for its proprietary spyware Pegasus, which is capable of remote zero-click surveillance ...
that can be installed on most cellphones and spies on the users' activity—has drawn attention both for use against criminals such as drug kingpin
El Chapo EL, El or el may refer to: Arts and entertainment Fictional entities * El, a character from the manga series ''Shugo Chara!'' by Peach-Pit * Eleven (''Stranger Things'') (El), a fictional character in the TV series ''Stranger Things'' * El, fami ...
as well as political dissidents, facilitating the murder of Jamal Khashoggi.


Causes


Technical causes

Despite developers' goal of delivering a product that works entirely as intended, virtually all
software Software consists of computer programs that instruct the Execution (computing), execution of a computer. Software also includes design documents and specifications. The history of software is closely tied to the development of digital comput ...
and hardware contains bugs. If a bug creates a security risk, it is called a
vulnerability Vulnerability refers to "the quality or state of being exposed to the possibility of being attacked or harmed, either physically or emotionally." The understanding of social and environmental vulnerability, as a methodological approach, involves ...
. Patches are often released to fix identified vulnerabilities, but those that remain unknown ( zero days) as well as those that have not been patched are still liable for exploitation. Both software written by the target of the breach and third party software used by them are vulnerable to attack. The software vendor is rarely legally liable for the cost of breaches, thus creating an incentive to make cheaper but less secure software. Vulnerabilities vary in their ability to be exploited by malicious actors. The most valuable allow the attacker to inject and run their own code (called
malware Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
), without the user being aware of it. Some malware is downloaded by users via clicking on a malicious link, but it is also possible for malicious
web applications A web application (or web app) is application software that is created with web technologies and runs via a web browser. Web applications emerged during the late 1990s and allowed for the server to dynamically build a response to the request, ...
to download malware just from visiting the website (
drive-by download In computer security, a drive-by download is the unintended download of software, typically Malware, malicious software. The term "drive-by download" usually refers to a download which was authorized by a user without understanding what is being ...
).
Keyloggers Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that a person using the keyboard is unaware that their actions are being monitored ...
, a type of malware that records a user's keystrokes, are often used in data breaches. The majority of data breaches could have been averted by storing all sensitive information in an encrypted format. That way, physical possession of the storage device or access to encrypted information is useless unless the attacker has the
encryption key A key in cryptography is a piece of information, usually a string of numbers or letters that are stored in a file, which, when processed through a cryptographic algorithm, can encode or decode cryptographic data. Based on the used method, the key ...
.
Hashing Hash, hashes, hash mark, or hashing may refer to: Substances * Hash (food), a coarse mixture of ingredients, often based on minced meat * Hash (stew), a pork and onion-based gravy found in South Carolina * Hash, a nickname for hashish, a cannab ...
is also a good solution for keeping
password A password, sometimes called a passcode, is secret data, typically a string of characters, usually used to confirm a user's identity. Traditionally, passwords were expected to be memorized, but the large number of password-protected services t ...
s safe from
brute-force attack In cryptography, a brute-force attack or exhaustive key search is a cryptanalytic attack that consists of an attacker submitting many possible keys or passwords with the hope of eventually guessing correctly. This strategy can theoretically be ...
s, but only if the algorithm is sufficiently secure. Many data breaches occur on the hardware operated by a partner of the organization targeted—including the
2013 Target data breach The history of Target Corporation first began in 1902 by George Dayton. The company was originally named Goodfellow Dry Goods in June 1902 before being renamed the Dayton's Dry Goods Company in 1903 and later the Dayton Company in 1910. The first ...
and
2014 JPMorgan Chase data breach The 2014 JPMorgan Chase data breach was a cyberattack against American bank JPMorgan Chase that is believed to have compromised data associated with over 83 million accounts—76 million households (approximately two out of three households in th ...
.
Outsourcing Outsourcing is a business practice in which companies use external providers to carry out business processes that would otherwise be handled internally. Outsourcing sometimes involves transferring employees and assets from one firm to another ...
work to a third party leads to a risk of data breach if that company has lower security standards; in particular, small companies often lack the resources to take as many security precautions. As a result, outsourcing agreements often include security guarantees and provisions for what happens in the event of a data breach.


Human causes

Human causes of breach are often based on trust of another actor that turns out to be malicious. Social engineering attacks rely on tricking an insider into doing something that compromises the system's security, such as revealing a password or clicking a link to download malware. Data breaches may also be deliberately caused by insiders. One type of social engineering,
phishing Phishing is a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware. Phishing attacks have become increasingly sophisticate ...
, obtains a user's
credential A credential is a piece of any document that details a qualification, competence, or authority issued to an individual by a third party with a relevant or ''de facto'' authority or assumed competence to do so. Examples of credentials include aca ...
s by sending them a malicious message impersonating a legitimate entity, such as a bank, and getting the user to enter their credentials onto a malicious website controlled by the cybercriminal.
Two-factor authentication Multi-factor authentication (MFA; two-factor authentication, or 2FA) is an electronic authentication method in which a user is granted access to a website or Application software, application only after successfully presenting two or more distin ...
can prevent the malicious actor from using the credentials. Training employees to recognize social engineering is another common strategy. Another source of breaches is accidental disclosure of information, for example publishing information that should be kept private. With the increase in
remote work Remote work (also called telecommuting, telework, work from or at home, WFH as an initialism, hybrid work, and other terms) is the practice of work (human activity), working at or from one's home or Third place, another space rather than from ...
and
bring your own device Bring your own device (BYOD ) (also called bring your own technology (BYOT), bring your own phone (BYOP), and bring your own personal computer (BYOPC)) refers to being allowed to use one's personally owned device, rather than being required to use ...
policies, large amounts of corporate data is stored on personal devices of employees. Via carelessness or disregard of company security policies, these devices can be lost or stolen. Technical solutions can prevent many causes of human error, such as encrypting all sensitive data, preventing employees from using insecure passwords, installing
antivirus software Antivirus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware. Antivirus software was originally developed to detect and remove computer viruses, hence the name ...
to prevent malware, and implementing a robust patching system to ensure that all devices are kept up to date.


Breach lifecycle


Prevention

Although attention to security can reduce the risk of data breach, it cannot bring it to zero. Security is not the only priority of organizations, and an attempt to achieve perfect security would make the technology unusable. Many companies hire a
chief information security officer A chief information security officer (CISO) is a senior-level executive within an organization responsible for establishing and maintaining the enterprise vision, strategy, and program to ensure information assets and technologies are adequately p ...
(CISO) to oversee the company's information security strategy. To obtain information about potential threats, security professionals will network with each other and share information with other organizations facing similar threats. Defense measures can include an updated incident response strategy, contracts with
digital forensics Digital forensics (sometimes known as digital forensic science) is a branch of forensic science encompassing the recovery, investigation, examination, and analysis of material found in digital devices, often in relation to mobile devices and com ...
firms that could investigate a breach,
cyber insurance Cyber insurance is a specialty insurance product that protects businesses from risks relating to information technology infrastructure and activities. Advantages Because the cyber insurance market in many countries is relatively small compared to ...
, and monitoring the
dark web The dark web is the World Wide Web content that exists on darknets ( overlay networks) that use the Internet but require specific software, configurations, or authorization to access. Through the dark web, private computer networks can communica ...
for stolen credentials of employees. In 2024, the United States
National Institute of Standards and Technology The National Institute of Standards and Technology (NIST) is an agency of the United States Department of Commerce whose mission is to promote American innovation and industrial competitiveness. NIST's activities are organized into Outline of p ...
(NIST) issued a special publication, "Data Confidentiality: Identifying and Protecting Assets Against Data Breaches". The
NIST Cybersecurity Framework The NIST Cybersecurity Framework (CSF) is a set of voluntary guidelines designed to help organizations assess and improve their ability to prevent, detect, and respond to cybersecurity risks. Developed by the U.S. National Institute of Standards ...
also contains information about data protection. Other organizations have released different standards for data protection. The architecture of a company's systems plays a key role in deterring attackers. Daswani and Elbayadi recommend having only one means of
authentication Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an Logical assertion, assertion, such as the Digital identity, identity of a computer system user. In contrast with iden ...
, avoiding redundant systems, and making the most secure setting default.
Defense in depth Defence in depth (also known as deep defence or elastic defence) is a military strategy that seeks to delay rather than prevent the advance of an attacker, buying time and causing additional casualties by yielding space. Rather than defeating a ...
and
distributed privilege Distribution may refer to: Mathematics *Distribution (mathematics), generalized functions used to formulate solutions of partial differential equations *Probability distribution, the probability of a particular value or value range of a varia ...
(requiring multiple authentications to execute an operation) also can make a system more difficult to hack. Giving employees and software the least amount of access necessary to fulfill their functions (
principle of least privilege In information security, computer science, and other fields, the principle of least privilege (PoLP), also known as the principle of minimal privilege (PoMP) or the principle of least authority (PoLA), requires that in a particular abstraction l ...
) limits the likelihood and damage of breaches. Several data breaches were enabled by reliance on security by obscurity; the victims had put access credentials in publicly accessible files. Nevertheless, prioritizing ease of use is also important because otherwise users might circumvent the security systems. Rigorous
software testing Software testing is the act of checking whether software satisfies expectations. Software testing can provide objective, independent information about the Quality (business), quality of software and the risk of its failure to a User (computin ...
, including
penetration testing A penetration test, colloquially known as a pentest, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system; this is not to be confused with a vulnerability assessment. The test is performed ...
, can reduce software vulnerabilities, and must be performed prior to each release even if the company is using a continuous integration/continuous deployment model where new versions are constantly being rolled out. The principle of least persistence—avoiding the collection of data that is not necessary and destruction of data that is no longer necessary—can mitigate the harm from breaches. The challenge is that destroying data can be more complex with modern database systems.


Response

A large number of data breaches are never detected. Of those that are, most breaches are detected by third parties; others are detected by employees or automated systems. Responding to breaches is often the responsibility of a dedicated computer security incident response team, often including technical experts,
public relations Public relations (PR) is the practice of managing and disseminating information from an individual or an organization (such as a business, government agency, or a nonprofit organization) to the public in order to influence their perception. Pu ...
, and legal counsel. Many companies do not have sufficient expertise in-house, and subcontract some of these roles; often, these outside resources are provided by the cyber insurance policy. After a data breach becomes known to the company, the next steps typically include confirming it occurred, notifying the response team, and attempting to contain the damage. To stop exfiltration of data, common strategies include shutting down affected servers, taking them offline,
patching Patching is a small village and civil parish that lies amid the fields and woods of the southern slopes of the South Downs in the National Park in the Arun District of West Sussex, England. It has a visible hill-workings history going back t ...
the vulnerability, and
rebuilding Remanufacturing is "the rebuilding of a product to specifications of the original manufactured product using a combination of reused, repaired and new parts". It requires the repair or replacement of worn out or obsolete components and modules. P ...
. Once the exact way that the data was compromised is identified, there is typically only one or two technical vulnerabilities that need to be addressed in order to contain the breach and prevent it from reoccurring. A
penetration test A penetration test, colloquially known as a pentest, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system; this is not to be confused with a vulnerability assessment. The test is perform ...
can then verify that the fix is working as expected. If
malware Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
is involved, the organization must investigate and close all infiltration and exfiltration vectors, as well as locate and remove all malware from its systems. If data was posted on the
dark web The dark web is the World Wide Web content that exists on darknets ( overlay networks) that use the Internet but require specific software, configurations, or authorization to access. Through the dark web, private computer networks can communica ...
, companies may attempt to have it taken down. Containing the breach can compromise investigation, and some tactics (such as shutting down servers) can violate the company's contractual obligations. Gathering data about the breach can facilitate later litigation or criminal prosecution, but only if the data is gathered according to legal standards and the
chain of custody Chain of custody (CoC), in legal contexts, is the chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of materials, including physical or electronic evidence. Of particul ...
is maintained. Database forensics can narrow down the records involved, limiting the scope of the incident. Extensive investigation may be undertaken, which can be even more expensive than
litigation A lawsuit is a proceeding by one or more parties (the plaintiff or claimant) against one or more parties (the defendant) in a civil court of law. The archaic term "suit in law" is found in only a small number of laws still in effect today. ...
. In the United States, breaches may be investigated by government agencies such as the
Office for Civil Rights The Office for Civil Rights (OCR) is a sub-agency of the U.S. Department of Education that is primarily focused on enforcing civil rights laws prohibiting schools from engaging in discrimination on the basis of race, color, national origin, sex ...
, the
United States Department of Health and Human Services The United States Department of Health and Human Services (HHS) is a cabinet-level executive branch department of the US federal government created to protect the health of the US people and providing essential human services. Its motto is ...
, and the
Federal Trade Commission The Federal Trade Commission (FTC) is an independent agency of the United States government whose principal mission is the enforcement of civil (non-criminal) United States antitrust law, antitrust law and the promotion of consumer protection. It ...
(FTC). Law enforcement agencies may investigate breaches although the hackers responsible are rarely caught. Notifications are typically sent out as required by law. Many companies offer free
credit monitoring Credit report monitoring or company tracking is the monitoring of one's credit history in order to detect any suspicious activity or changes. Companies offer such service on a subscription basis, typically granting regular access to one's credit h ...
to people affected by a data breach, although only around 5 percent of those eligible take advantage of the service. Issuing new credit cards to consumers, although expensive, is an effective strategy to reduce the risk of
credit card fraud Credit card fraud is an inclusive term for fraud committed using a payment card, such as a credit card or debit card. The purpose may be to obtain goods or services or to make payment to another account, which is controlled by a criminal. The P ...
. Companies try to restore trust in their business operations and take steps to prevent a breach from reoccurring.


Consequences


For consumers

After a data breach, criminals make money by selling data, such as usernames, passwords,
social media Social media are interactive technologies that facilitate the Content creation, creation, information exchange, sharing and news aggregator, aggregation of Content (media), content (such as ideas, interests, and other forms of expression) amongs ...
or
customer loyalty In marketing and consumer behaviour, brand loyalty describes a consumer's persistent positive feelings towards a familiar brand and their dedication to purchasing the brand's products and/or services repeatedly regardless of deficiencies, a co ...
account information,
debit Debits and credits in double-entry bookkeeping are entries made in account ledgers to record changes in value resulting from business transactions. A debit entry in an account represents a transfer of value ''to'' that account, and a cred ...
and credit card numbers, and personal health information (see medical data breach). Criminals often sell this data on the
dark web The dark web is the World Wide Web content that exists on darknets ( overlay networks) that use the Internet but require specific software, configurations, or authorization to access. Through the dark web, private computer networks can communica ...
—parts of the internet where it is difficult to trace users and illicit activity is widespread—using platforms like .onion or
I2P The Invisible Internet Project (I2P) is an anonymous network layer (implemented as a mix network) that allows for censorship-resistant, peer-to-peer communication. Anonymous connections are achieved by encrypting the user's traffic (by usin ...
. Originating in the 2000s, the dark web, followed by untraceable
cryptocurrencies A cryptocurrency (colloquially crypto) is a digital currency designed to work through a computer network that is not reliant on any central authority, such as a government or bank, to uphold or maintain it. Individual coin ownership records ...
such as
Bitcoin Bitcoin (abbreviation: BTC; Currency symbol, sign: ₿) is the first Decentralized application, decentralized cryptocurrency. Based on a free-market ideology, bitcoin was invented in 2008 when an unknown entity published a white paper under ...
in the 2010s, made it possible for criminals to sell data obtained in breaches with minimal risk of getting caught, facilitating an increase in hacking. One popular darknet marketplace,
Silk Road The Silk Road was a network of Asian trade routes active from the second century BCE until the mid-15th century. Spanning over , it played a central role in facilitating economic, cultural, political, and religious interactions between the ...
, was shut down in 2013 and its operators arrested, but several other marketplaces emerged in its place.
Telegram Telegraphy is the long-distance transmission of messages where the sender uses symbolic codes, known to the recipient, rather than a physical exchange of an object bearing the message. Thus flag semaphore is a method of telegraphy, whereas pi ...
is also a popular forum for illegal sales of data. This information may be used for a variety of purposes, such as
spamming Spamming is the use of messaging systems to send multiple unsolicited messages (spam) to large numbers of recipients for the purpose of commercial advertising, non-commercial proselytizing, or any prohibited purpose (especially phishing), or si ...
, obtaining products with a victim's loyalty or payment information,
identity theft Identity theft, identity piracy or identity infringement occurs when someone uses another's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. ...
, prescription drug fraud, or
insurance fraud Insurance fraud is any intentional act committed to deceive or mislead an insurance company during the application or claims process, or the wrongful denial of a legitimate claim by an insurance company. It occurs when a claimant knowingly attem ...
. The threat of data breach or revealing information obtained in a data breach can be used for
extortion Extortion is the practice of obtaining benefit (e.g., money or goods) through coercion. In most jurisdictions it is likely to constitute a criminal offence. Robbery is the simplest and most common form of extortion, although making unfounded ...
. Consumers may suffer various forms of tangible or intangible harm from the theft of their personal data, or not notice any harm. A significant portion of those affected by a data breach become victims of
identity theft Identity theft, identity piracy or identity infringement occurs when someone uses another's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. ...
. A person's identifying information often circulates on the dark web for years, causing an increased risk of identity theft regardless of remediation efforts. Even if a customer does not end up footing the bill for
credit card fraud Credit card fraud is an inclusive term for fraud committed using a payment card, such as a credit card or debit card. The purpose may be to obtain goods or services or to make payment to another account, which is controlled by a criminal. The P ...
or identity theft, they have to spend time resolving the situation. Intangible harms include
doxxing Doxing or doxxing is the act of publicly providing personally identifiable information about an individual or organization, usually via the Internet and without their consent. Historically, the term has been used to refer to both the aggregati ...
(publicly revealing someone's personal information), for example medication usage or personal photos.


For organizations

There is little empirical evidence of economic harm from breaches except the direct cost, although there is some evidence suggesting a temporary, short-term decline in
stock price A share price is the price of a single share of a number of saleable equity shares of a company. In layman's terms, the stock price is the highest amount someone is willing to pay for the stock, or the lowest amount that it can be bought for. B ...
. Other impacts on the company can range from lost business, reduced employee productivity due to systems being offline or personnel redirected to working on the breach, resignation or firing of senior executives, reputational damage, and increasing the future cost of auditing or security. Consumer losses from a breach are usually a negative
externality In economics, an externality is an Indirect costs, indirect cost (external cost) or indirect benefit (external benefit) to an uninvolved third party that arises as an effect of another party's (or parties') activity. Externalities can be conside ...
for the business. Some experts have argued that the evidence suggests there is not enough direct costs or reputational damage from data breaches to sufficiently
incentivize In general, incentives are anything that persuade a person or organization to alter their behavior to produce the desired outcome. The laws of economists and of behavior state that higher incentives amount to greater levels of effort and therefo ...
their prevention. Estimating the cost of data breaches is difficult, both because not all breaches are reported and also because calculating the impact of breaches in financial terms is not straightforward. There are multiple ways of calculating the cost to businesses, especially when it comes to personnel time dedicated to dealing with the breach. Author Kevvie Fowler estimates that more than half the direct cost incurred by companies is in the form of litigation expenses and services provided to affected individuals, with the remaining cost split between notification and detection, including forensics and investigation. He argues that these costs are reduced if the organization has invested in security prior to the breach or has previous experience with breaches. The more
data record In a relational database, a row or " record" or "tuple", represents a single, implicitly structured data item in a table. A database table can be thought of as consisting of rows and columns.Sasha Romanosky Sacha, Sasha, or Sascha may refer to: People * Sasha (name), includes list of people with the name and the variants Sascha or Sacha Musicians * Sacha (singer), born Sacha Visagie, Canadian singer and songwriter * Sasha (DJ) (born 1969), born Alex ...
estimated that while the mean breach cost around the targeted firm $5 million, this figure was inflated by a few highly expensive breaches, and the typical data breach was much less costly, around $200,000. Romanosky estimated the total annual cost to corporations in the United States to be around $10 billion.


Laws


Notification

The law regarding data breaches is often found in legislation to protect privacy more generally, and is dominated by provisions mandating notification when breaches occur. Laws differ greatly in how breaches are defined, what type of information is protected, the deadline for notification, and who has
standing Standing, also referred to as orthostasis, is a position in which the body is held in an upright (orthostatic) position and supported only by the feet. Although seemingly static, the body rocks slightly back and forth from the ankle in the ...
to sue if the law is violated. Notification laws increase transparency and provide a reputational incentive for companies to reduce breaches. The cost of notifying the breach can be high if many people were affected and is incurred regardless of the company's responsibility, so it can function like a
strict liability In criminal and civil law, strict liability is a standard of liability under which a person is legally responsible for the consequences flowing from an activity even in the absence of fault or criminal intent on the part of the defendant. Und ...
fine. , ''Thomas on Data Breach'' listed 62
United Nations member states The United Nations comprise sovereign states and the world's largest intergovernmental organization. All members have equal representation in the UN General Assembly. The Charter of the United Nations defines the rules for admission of ...
that are covered by data breach notification laws. Some other countries require breach notification in more general data protection laws. Shortly after the first reported data breach in April 2002, California passed a law requiring notification when an individual's personal information was breached. In the United States, notification laws proliferated after the February 2005
ChoicePoint data breach LexisNexis Risk Solutions is a global data and analytics company that provides data and technology services, analytics, predictive insights, and fraud prevention for a wide range of industries. It is headquartered in Alpharetta, Georgia (part o ...
, widely publicized in part because of the large number of people affected (more than 140,000) and also because of outrage that the company initially informed only affected people in California. In 2018, the
European Union The European Union (EU) is a supranational union, supranational political union, political and economic union of Member state of the European Union, member states that are Geography of the European Union, located primarily in Europe. The u ...
's
General Data Protection Regulation The General Data Protection Regulation (Regulation (EU) 2016/679), abbreviated GDPR, is a European Union regulation on information privacy in the European Union (EU) and the European Economic Area (EEA). The GDPR is an important component of ...
(GDPR) took effect. The GDPR requires notification within 72 hours, with very high fines possible for large companies not in compliance. This regulation also stimulated the tightening of data privacy laws elsewhere. , the only
United States federal law The law of the United States comprises many levels of Codification (law), codified and uncodified forms of law, of which the supreme law is the nation's Constitution of the United States, Constitution, which prescribes the foundation of the ...
requiring notification for data breaches is limited to medical data regulated under
HIPAA The Health Insurance Portability and Accountability Act of 1996 (HIPAA or the Kennedy– Kassebaum Act) is a United States Act of Congress enacted by the 104th United States Congress and signed into law by President Bill Clinton on August 21, ...
, but all 50 states (since Alabama passed a law in 2018) have their own general data breach notification laws.


Security safeguards

Measures to protect data from a breach are typically absent from the law or vague. Filling this gap is standards required by
cyber insurance Cyber insurance is a specialty insurance product that protects businesses from risks relating to information technology infrastructure and activities. Advantages Because the cyber insurance market in many countries is relatively small compared to ...
, which is held by most large companies and functions as ''de facto'' regulation. Of the laws that do exist, there are two main approaches—one that prescribes specific standards to follow, and the
reasonableness The concept of reasonableness has two related meanings in law and political theory: # As a legal norm, it is used "for the assessment of such matters as actions, decisions, and persons, rules and institutions, ndalso arguments and judgments." # ...
approach. The former is rarely used due to a lack of flexibility and reluctance of legislators to arbitrate technical issues; with the latter approach, the law is vague but specific standards can emerge from
case law Case law, also used interchangeably with common law, is a law that is based on precedents, that is the judicial decisions from previous cases, rather than law based on constitutions, statutes, or regulations. Case law uses the detailed facts of ...
. Companies often prefer the standards approach for providing greater
legal certainty Legal certainty is a principle in national and international law which holds that the law must provide those subject to it with the ability to regulate their conduct. See also * * *Due process *International human rights law International human ...
, but they might check all the boxes without providing a secure product. An additional flaw is that the laws are poorly enforced, with penalties often much less than the cost of a breach, and many companies do not follow them.


Litigation

Many
class-action lawsuit A class action is a form of lawsuit. Class Action may also refer to: * ''Class Action'' (film), 1991, starring Gene Hackman and Mary Elizabeth Mastrantonio * Class Action (band), a garage house band * "Class Action" (''Teenage Robot''), a 2002 e ...
s,
derivative suit A shareholder derivative suit is a lawsuit brought by a shareholder on behalf of a corporation against a third party. Often, the third party is an insider of the corporation, such as an executive officer or director. Shareholder derivative suits are ...
s, and other litigation have been brought after data breaches. They are often
settled A settler or a colonist is a person who establishes or joins a permanent presence that is separate to existing communities. The entity that a settler establishes is a settlement. A settler is called a pioneer if they are among the first settli ...
regardless of the merits of the case due to the high cost of litigation. Even if a settlement is paid, few affected consumers receive any money as it usually is only cents to a few dollars per victim. Legal scholars
Daniel J. Solove Daniel J. Solove (; born 1972) is the Eugene L. and Barbara A. Bernard Professor of Intellectual Property and Technology Law at the George Washington University Law School.
and Woodrow Hartzog argue that "Litigation has increased the costs of data breaches but has accomplished little else." Plaintiffs often struggle to prove that they suffered harm from a data breach. The contribution of a company's actions to a data breach varies, and likewise the liability for the damage resulting for data breaches is a contested matter. It is disputed what standard should be applied, whether it is strict liability,
negligence Negligence ( Lat. ''negligentia'') is a failure to exercise appropriate care expected to be exercised in similar circumstances. Within the scope of tort law, negligence pertains to harm caused by the violation of a duty of care through a neg ...
, or something else.


See also

*
Full disclosure (computer security) In the field of computer security, independent researchers often discover flaws in software that can be abused to cause unintended behaviour; these flaws are called vulnerabilities. The process by which the analysis of these vulnerabilities is sh ...
* Medical data breach *
Surveillance capitalism Surveillance capitalism is a concept in political economics which denotes the widespread collection and commodification of personal data by corporations. This phenomenon is distinct from government surveillance, although the two can be mutuall ...


References


Sources

* * * * * * * * * * * * * * * * * * * * {{Information security
Breach Breach, Breached, or The Breach may refer to: Places * Breach, Kent, United Kingdom * Breach, West Sussex, United Kingdom * ''The Breach'', Great South Bay in the State of New York People * Breach (DJ), an Electronic/House music act * Mirosla ...
Data laws Secure communication Security breaches Computer security