{"id":1684,"date":"2010-01-15T15:12:34","date_gmt":"2010-01-15T20:12:34","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/?p=1684"},"modified":"2022-12-30T12:38:16","modified_gmt":"2022-12-30T17:38:16","slug":"paper-based-data-breaches-growing","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/paper-based-data-breaches-growing\/","title":{"rendered":"Paper Based Data Breaches Growing"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-1798 size-full\" style=\"border: 0pt none; margin: 2px;\" title=\"Paper Based Data Breaches Growing\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2009\/12\/datadestruction-e1561947738413.jpg?resize=68%2C101&#038;ssl=1\" alt=\"Paper Based Data Breaches Growing\" width=\"68\" height=\"101\" \/>Brian Krebs at the <a href=\"https:\/\/www.washingtonpost.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Washington Post&#8217;s<\/em><\/a> <a href=\"https:\/\/web.archive.org\/web\/20210606100958\/http:\/\/voices.washingtonpost.com\/securityfix\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security Fix<\/a> points out that <a href=\"https:\/\/web.archive.org\/web\/20160326045528\/http:\/\/voices.washingtonpost.com\/securityfix\/2009\/12\/paper_data_breaches.html\" target=\"_blank\" rel=\"noopener noreferrer\">paper-based data\u00a0breaches on the rise<\/a>. Krebs cites statistics for the <a href=\"https:\/\/www.idtheftcenter.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Identity Theft Resource Center<\/a>, a San Diego-based nonprofit which says at least 27 percent of the data breaches disclosed publicly in 2009 stemmed from collections of sensitive consumer information printed on paper that was lost, stolen, inadvertently distributed, or improperly disposed of.<\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/www.idtheftcenter.org\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"wp-image-1689 alignright\" style=\"border: 0pt none; margin: 2px;\" title=\"itrc_logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2009\/12\/itrc_logo.gif?resize=110%2C64&#038;ssl=1\" alt=\"\" width=\"110\" height=\"64\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2009\/12\/itrc_logo.gif?w=154&amp;ssl=1 154w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2009\/12\/itrc_logo.gif?resize=150%2C87&amp;ssl=1 150w\" sizes=\"auto, (max-width: 110px) 100vw, 110px\" \/><\/a>The ITRC has logged 125 paper breaches of the 463 incidents they recorded in 2009. These breaches were across all sectors, with businesses having the most followed by the government sector.<\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/www.idtheftcenter.org\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"wp-image-1811 size-full aligncenter\" style=\"border: 0pt none;\" title=\"PaperSectors\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2010\/01\/PaperSectors-e1263585604862.gif?resize=287%2C246&#038;ssl=1\" alt=\"\" width=\"287\" height=\"246\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2010\/01\/PaperSectors-e1263585604862.gif?w=287&amp;ssl=1 287w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2010\/01\/PaperSectors-e1263585604862.gif?resize=150%2C128&amp;ssl=1 150w\" sizes=\"auto, (max-width: 287px) 100vw, 287px\" \/><\/a><\/p>\n<p>&#8220;Computers were supposed to take us to a paperless society, yet computers probably create more paper than before we had them because now we want a hard copy as well as what&#8217;s on the computer,&#8221; ITRC co-founder Linda Foley told Security Fix. &#8220;It&#8217;s a double danger of course because paper &#8211; especially when it&#8217;s just tossed in a dumpster somewhere &#8211; is not like data on a hard drive. It&#8217;s ready to use, it often contains the consumer&#8217;s handwriting and signatures, which can be very useful when you&#8217;re talking about forging credit card and mortgage applications.&#8221;<\/p>\n<p>Stuart Ingis, a partner with the law firm <a title=\"Venable LLP\" href=\"http:\/\/en.wikipedia.org\/wiki\/Venable_LLP\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">Venable LLP<\/a> in Washington, told Security Fix that many clients he deals with strictly speaking do not have a legal obligation to report paper-based breaches, but that most of his clients err on the side of caution.<\/p>\n<p>Experts say that paper data\u00a0breach incidents come to light in large part due to a proliferation of state <a title=\"Security breach notification laws\" href=\"http:\/\/en.wikipedia.org\/wiki\/Security_breach_notification_laws\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">data breach notification laws<\/a>. Some 45 states and the District of Columbia have enacted laws requiring companies that lose control over sensitive consumer data such as Social Security or bank account numbers to alert affected consumers and in some cases state authorities. Concerned about the mounting costs of complying with so many state breach regulations, businesses often find it easier and cheaper to adhere to the strictest state laws. The current federal data breach notification proposals will preempt state measures and will allow paper-based breaches to go unreported because they would require notification only when data stored electronically is lost or stolen and are largely silent on paper breaches. Only Massachusetts and North Carolina currently require notification whether the data breach is in electronic or paper form.<\/p>\n<p><em><strong>rb-<\/strong><br \/>\nWhen we talk to clients about information security and not just information technology security, we ask them to consider that lost paper documents are just as damaging to a company&#8217;s reputation should they get into the wrong hands as electronic data stored in an Excel spreadsheet or database server? But data on paper is just another form of data that needs to be protected by <a href=\"http:\/\/en.wikipedia.org\/wiki\/Information_security\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">information security policies<\/a>.<\/em><\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li>Identity theft and data breaches increased in 2010 (lexingtonlaw.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Brian Krebs says 27% of 2009 data breaches stemmed from the collection of paper-based consumer information that was lost stolen or improperly disposed of.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3240,1795,849,2077,123,124,185,4],"class_list":["post-1684","post","type-post","status-publish","format-standard","hentry","category-security","tag-3240","tag-breach","tag-data","tag-dumpstrer-diving","tag-itrc","tag-paper","tag-privacy","tag-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/1684","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=1684"}],"version-history":[{"count":12,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/1684\/revisions"}],"predecessor-version":[{"id":125595,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/1684\/revisions\/125595"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=1684"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=1684"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=1684"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}