What if a professor loses his laptop containing sensitive information about students while he is on vacation in Africa? Or a company's internal database with private employee information is inadvertently exposed to the world on an external Web site?

What happens if backup computer tapes are lost en route to an offsite storage site and it is unclear whether the information on them is protected by encryption? Or what if, by mistake, a company sends out a bill to one customer that includes private information about other customers?

Contrary to what many might think, the common thread among these data breaches is not the hackers (outsiders who break into your computer system) and phishers (e-mail con artists who try to trick you into supplying private information) that people worry about when they think of stolen data.

Recommended For You

Want to continue reading?
Become a Free PropertyCasualty360 Digital Reader

Your access to unlimited PropertyCasualty360 content isn’t changing.
Once you are an ALM digital member, you’ll receive:

  • Breaking insurance news and analysis, on-site and via our newsletters and custom alerts
  • Weekly Insurance Speak podcast featuring exclusive interviews with industry leaders
  • Educational webcasts, white papers, and ebooks from industry thought leaders
  • Critical converage of the employee benefits and financial advisory markets on our other ALM sites, BenefitsPRO and ThinkAdvisor
NOT FOR REPRINT

© Touchpoint Markets, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more inforrmation visit Asset & Logo Licensing.