Data Breaching Summary

980 Words2 Pages

The Serious Societal Concern of Data Breaching: Which Current laws address this issue and and Areas of Improvement and Concern

Summary of Event and Data Breaching
Amongst almost millions of others, I was one of the T-Mobile customers whose account had customer data stolen from it in 2014. My personal data including my birthday, home address, driver license number, and full name was amongst important information stolen. I was at that time, grateful that at least my credit card information was not retrieved by these hackers. What occurred was that T-Mobile, a mobile service provider, sends its customer’s data to Experian, who is responsible for checking each customer’s credit score, using this personal data to check if that client is a good …show more content…

Even though the wrongdoing did not include stolen credit card information, I still feel this is a highly dangerous and threatening situation in which to find oneself. This type of data breaching, could leave one homeless, and robbed of everything they have and own, including their identity. This did only occur in this one circumstance. Data breaching has also been an issue at major retailers such as Macy’s, Target, and Home Depot, amongst others. First, issues regarding what problems arise due to data breach will be …show more content…

However, there are certain precautions and guidelines individuals can follow which will help mitigate this likelihood and help this matter decrease in a minute manner. If an individual is adept and disciplined about monitoring themselves, their credit card statements, bank statements, shredding junk mail, creating engaging, strong and hidden online passwords, and not “clicking through,” on fishy emails, this will significantly decrease their chances of being robbed of their key data, and data breaching. Even though things such as “freezing credit reports,” and other remediation methods exist, these do not present sufficient help. Once data has been breached, it is wise to know which steps to take such as the above mentioned, so that the damage does not

Open Document