article thumbnail

Target Sues Insurer Over 2013 Data Breach Costs

Data Breach Today

in an attempt to recoup money it spent to replace payment cards as part of settlements over the retailer's massive 2013 data breach. Lawsuit Claims Insurer Owes Retailer for Coverage of Card Replacement Costs Target has filed a lawsuit against its long-time insurer, ACE American Insurance Co., Find out how much money the company is seeking.

Insurance 341
article thumbnail

Medical Center Fined $4.75M in Insider ID Theft Incident

Data Breach Today

HHS OCR Says a Malicious Worker Stole and Sold Patient Information in 2013 HHS has fined a New York City medical center $4.75 million to settle potential HIPAA violations discovered during an investigation into a hospital insider who sold patient data to identity thieves in 2013.

Privacy 264
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ISO 27001:2022 Has Been Released – What Does It Mean for Your Organisation?

IT Governance

The introduction of ISO 27001:2022 won’t have an immediate effect on organisations that are currently certified to ISO 27001:2013 or are in the process of achieving certification. For the time being, organisations should continue to follow the 2013 version of the Standard. How will this affect organisations implementing ISO 27001?

IT 119
article thumbnail

Who Stole 3.6M Tax Records from South Carolina?

Krebs on Security

As it happens, Rescator’s criminal hacking crew was directly responsible for the 2013 breach at Target and the 2014 hack of Home Depot. According to a 2013 report from the Treasury Inspector General’s office, the IRS issued nearly $4 billion in bogus tax refunds in 2012, and more than $5.8 billion in 2013.

Sales 216
article thumbnail

The Truth About Customer Journey Mapping

Speaker: Dave Seaton, CEO of Seaton CX

Is Customer Journey Mapping a tired fad from 2013? Or a critical tool for sparking customer-centric change? 💥 The answer lies not in the map itself, but in the mapping process.

article thumbnail

CISA adds Stuxnet bug to its Known Exploited Vulnerabilities Catalog

Security Affairs

CVE-2013-6282 : Linux Kernel – The get_user and put_user API functions of the Linux kernel fail to validate the target address when being used on ARM v6k/v7 platforms. CVE-2013-2596 Linux Kernel – Linux kernel fb_mmap function in drivers/video/fbmem.c Code Aurora is used in third-party products such as Qualcomm and Android.

IT 97
article thumbnail

Personal Data Breach Notification – it's time to scrap the unfair rules that have been imposed on Communication Service providers

Data Protector

In August 2013 the European Commission introduced new rules to require Communication Service Providers to report all personal data breaches, no matter how minor, to local data protection regulators within 24 hours of the incident being detected [Art 2]. Goodbye and good riddance, Commission Regulation 611/2013!

article thumbnail

Monetizing Analytics Features: Why Data Visualizations Will Never Be Enough

Think your customers will pay more for data visualizations in your application? Five years ago they may have. But today, dashboards and visualizations have become table stakes. Discover which features will differentiate your application and maximize the ROI of your embedded analytics. Brought to you by Logi Analytics.

article thumbnail

New Study: 2018 State of Embedded Analytics Report

Why do some embedded analytics projects succeed while others fail? We surveyed 500+ application teams embedding analytics to find out which analytics features actually move the needle. Read the 6th annual State of Embedded Analytics Report to discover new best practices. Brought to you by Logi Analytics.