I wish I had a bitcoin for every time I get an email with the subject line “Data Breach,” yet the facts upon investigation reveal no notifiable breach occurred.
In the Venn diagram of cyber security, the big rectangle is security incidents, enveloping a smaller circle of incidents that are breaches under state PI breach notification statutes. And a yet smaller circle are the breaches for which these statutes require notification of affected individuals.
So, what are common scenarios in which a security incident does not trigger notification duties under state PI breach notification statutes?Continue Reading When is a “data breach” not a breach?

Sorry to revive ugly memories of last fall’s vituperative presidential campaign, in which
As the calendar year turned there were several great
Having too much data causes problems beyond needless storage costs, workplace inefficiencies, and uncontrolled litigation expenses. Keeping data without a legal or business reason also exacerbates data security exposures. To put it bluntly, businesses that tolerate troves of unnecessary data are playing cybersecurity roulette … with even larger caliber ammunition.

Being a CISO is a tough gig. The perpetual deluge of news items on 
In my last post I talked about
This week, with echoes of vintage