The Practical Lawyer | 39
Steven C. Bennett With a combination of risk assessment, technical solutions, and stafg training, it is possible to keep data secure.
InformatIon Is the new currency of commerce. Sensitive data, such as social security numbers, credit card information, fjnancial records, health data, and in- tellectual property may be worth millions of dollars in the hands of hackers and data thieves. With the assis- tance of the Internet and new storage media, confjden- tial information may be compromised on a larger scale and faster pace. In 2006 and 2007, for example, more than 300 major incidents of data breach were reported each year, and 2008 is on pace for a similar total. Data Loss Archive and Database, www.attrition.org. Millions of pieces of personal data have been stolen in recent years,
- ften from prominent companies and organizations. At-
torney General Announces Data Breach At New York Bank Possibly Affecting Hundreds Of Thousands Of Ct. Consumers, Millions Nationwide, CT.gov, May 21, 2008, www.ct.gov/ag/cwp/
- view. Even without actual identity theft, the magnitude
- f the problem of data security, and the potential cost of
remedying data breaches, has become a major problem. If organizations and companies do not address data se- curity issues, critical threats to information privacy may
- develop. Businesses and other organizations thus must
take action to secure the sensitive data they control. This article provides a list of potential actions that businesses
Steven C. Bennett
is a partner at Jones Day in New York, and teaches Electronic Discovery at Rutgers Law School. The views expressed, however, are solely those of the author, and should not be attributed to the author’s fjrm, or its clients. Xi Steve Chen and Brandon T. Morris, summer associates at Jones Day, assisted in the preparation of this article.