Email Encryption: NY Yankees Breaches Info For 20,000 Season Ticket Holders.

A spreadsheet containing New York Yankees season ticket holders’ information was emailed to nearly 2,000 people.  The spreadsheet contained information on 21,446 ticket holders.  When dealing with emails that hold quite a bit of data, it’s always advisable that one look into data encryption like AlertBoot. VIPs Not Affected The NYY revealed in a public […] read more

Data Encryption: Email Addresses Are PII, Personally Identifiable Information, According To Decade-Old Cases.

Conflicting emotions run though me whenever I read about data breaches that only involve names and e-mail addresses.  On the one hand, it doesn’t seem like a particularly egregious breach: the information doesn’t appear to be any more personal than your phone number in the local telephone directory.  On the other, it can be used […] read more

HIPAA Encryption: Medical Researchers Get Some Recommendations From Colleagues.

In a paper titled “How Strong are Passwords Used to Protect Personal Health Information in Clinical Trials?” El Emam et al. note that most researchers involved in clinical trials are not properly using data security tools like encryption.  This is not necessarily because the researchers are not trying but because they’re not aware that there […] read more

Email Encryption: Small Data Controversy Involving Brisbane’s Bicycle Sharing.

CityCycle — Australia, Brisbane’s shared bicycle program — was involved in a slight data breach.  I’m not sure I would recommend data encryption in this particular case, although it certainly would have prevented the breach from happening. CC v. BCC Due to human error, all subscribers to CityCycle were able to see each other’s e-mail […] read more

Email Data Encryption: ING/RLIC Has Breach, Encryption Didn’t Help Them.

One of the most used data loss protection (DLP) tools is the automatic encryption of any e-mails being sent out.  These work on the same principles surrounding laptop encryption software, but can be configured to scan the contents and apply encryption as necessary, depending on the product.  Others never quite deliver the e-mail, instead sending […] read more